Đang chuẩn bị liên kết để tải về tài liệu:
Database Encryption – An Overview of Contemporary Challenges and Design Considerations
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Bush posited Memex as “a device in which an individual stores all his books, records, and communications, and which is mechanized so that it may be consulted with exceeding speed and flexibility. It is an enlarged intimate supplement to his memory.” Memex was to be built into a desk with a keyboard, microphone, and display surfaces. Its interface could copy photos or papers, or could be written on. However, “most of the Memex contents are purchased on microfilm ready for insertion.” In a typical use scenario, the user “moves about and observes, he photographs and comments. Time is automatically. | Database Encryption - An Overview of Contemporary Challenges and Design Considerations Erez Shmueli Deutsche Telekom Laboratories and the Department of Information Systems Engineering Ben-Gurion University. Beer Sheva Israel Ronen Vaisenberg School of Computer Science University of California. Irvine CA USA1 Yuval Elovici Deutsche Telekom Laboratories and the Department of Information Systems Engineering Ben-Gurion University. Beer Sheva Israel Chanan Glezer Deutsche Telekom Laboratories at Ben-Gurion University. Beer Sheva Israel erezshmu@bgu.ac.il ronen@uci.edu elovici@bgu.ac.il chanan@bgu.ac.il ABSTRACT This article describes the major challenges and design considerations pertaining to database encryption. The article first presents an attack model and the main relevant challenges of data security encryption overhead key management and integration footprint. Next the article reviews related academic work on alternative encryption configurations pertaining to encryption locus indexing encrypted data and key management. Finally the article concludes with a benchmark using the following design criteria encryption configuration encryption granularity and keys storage. Categories and Subject Descriptors H. 2.7 Database Management Database Administration - Security integrity and protection. General Terms Security Keywords Database Encryption Security Privacy. I. INTRODUCTION Conventional database security solutions and mechanisms are divided into three layers physical security operating system security and DBMS Database Management System security 1 . With regard to the security of stored data access control . 1 Research performed while at the Department of Information Systems Engineering Ben-Gurion University i.e. authentication and authorization has proved to be useful as long as that data is accessed using the intended system interfaces. However access control is useless if the attacker simply gains access to the raw database data bypassing the traditional .