Affiliation:
1. Deutsche Telekom Laboratories at Ben-Gurion University, Beer Sheva, Israel
2. Science, University of California, Irvine, CA
Abstract
This article describes the major challenges and design considerations pertaining to database encryption. The article first presents an attack model and the main relevant challenges of data security, encryption overhead, key management, and integration footprint. Next, the article reviews related academic work on alternative encryption configurations pertaining to encryption locus; indexing encrypted data; and key management. Finally, the article concludes with a benchmark using the following design criteria: encryption configuration, encryption granularity and keys storage.
Publisher
Association for Computing Machinery (ACM)
Subject
Information Systems,Software
Reference23 articles.
1. Fernandez EB Summers RC Wood C (1980) Database Security and Integrity. Addison-Wesley Massachusetts. Fernandez EB Summers RC Wood C (1980) Database Security and Integrity. Addison-Wesley Massachusetts.
2. Multilevel secure database encryption with subkeys
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献