Skip to main content

Database Encryption

  • Reference work entry

Related Concepts

Hardware Security Module

Definition

Database encryption refers to the use of encryption techniques to transform a plain text database into a (partially) encrypted database, thus making it unreadable to anyone except those who possess the knowledge of the encryption key(s).

Theory

Database security encompasses three main properties: confidentiality, integrity, and availability. Roughly speaking, the confidentiality property enforces predefined restrictions while accessing the protected data, thus preventing disclosure to unauthorized persons. The integrity property guarantees that the data cannot be corrupted in an invisible way. Finally, the availability property ensures timely and reliable access to the database.

To preserve data confidentiality, enforcing access control policies defined on the database management system (DBMS) is a prevailing method. An access control policy, that is to say a set of authorizations, can take different forms depending on the underlying...

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Recommended Reading

  1. Hacigümüs H, Iyer B, Li C, Mehrotra S (2002) Providing database as a service. In: International conference on data engineering (ICDE). IEEE Computer Society, Washington, DC, pp 29–39

    Google Scholar 

  2. Agrawal R, Kiernan J, Srikant R, Yirong Xu (2002) Hippocratic databases. In: Proceedings of the 28th international conference on Very Large Data Bases. Morgan Kaufmann, pp 143–154

    Google Scholar 

  3. Damiani E, De Capitani Vimercati S, Jajodia S, Paraboschi S, Samarati P (2003) Balancing confidentiality and efficiency in untrusted relational dbms. In: Proceedings of the 10th ACM conference on computer and communications security. ACM, New York, pp 93–102

    Google Scholar 

  4. Bouganim L, Pucheral P (2002) Chip-secured data access: confidential data on untrusted servers. In: Proceedings of the 28th international conference on very large data bases. Morgan Kaufmann, pp 131–142

    Google Scholar 

  5. Hsueh S (2008) Database encryption in SQL server 2008 enterprise edition. SQL server technical article, 2008. December 29, 2010. http://msdn.microsoft.com/en-us/library/cc278098.aspx

  6. Oracle Corporation (2009) Oracle advanced security transparent data encryption best practices. White Paper, 2009

    Google Scholar 

  7. Oracle Corporation (2001) Database encryption in Oracle9i. White Paper, 2001

    Google Scholar 

  8. IBM corporation (2007) IBM database encryption expert: securing data in DB2, 2007

    Google Scholar 

  9. Sybase Inc (2008) Sybase adaptive server enterprise encryption option: protecting sensitive data, 2008. December 29, 2010. http://www.sybase.com

  10. Mattsson U (2004) Transparent encryption and separation of duties for enterprise databases: a practical implementation for field level privacy in databases. Protegrity Technical Paper. 2004. December 29, 2010. http://www.protegrity.com/whitepapers

  11. RSA Security company (2002) Securing data at rest: developing a database encryption strategy. Whiter Paper, 2002

    Google Scholar 

  12. Safenet (2009) Database encryption, 2009. December 29, 2010. http://www.safenet-inc.com/products/data-protection/database-protection/

  13. Hacigumus H, Iyer BR, Mehrotra S, Effcient execution of aggregation queries over encrypted relational databases. In: DASFAA. Springer, pp 125–136

    Google Scholar 

  14. Chung SS, Ozsoyoglu G (2006) Anti-tamper databases: processing aggregate queries over encrypted databases. In: Proceedings of the 22nd international conference on data engineering workshops. Washington, 2006. IEEE, pp 98–107

    Google Scholar 

  15. Agrawal R, Kiernan J, Srikant R, and Yirong Xu, Order preserving encryption for numeric data. Proceedings of the 2004 ACM SIGMOD international conference on management of data. ACM, New York, pp 563–574

    Google Scholar 

  16. Ge T, Zdonik S (2007) Fast, secure encryption for indexing in a column-oriented dbms. IEEE 23rd international conference on data engineering. 2007. IEEE, pp 676–685

    Google Scholar 

  17. Li F, Hadjieleftheriou M, Kollios G, Reyzin L (2006) Dynamic authenticated index structures for outsourced databases. Proceedings of the 2006 ACM SIGMOD international conference on management of data. ACM, New York, pp 121–132

    Google Scholar 

  18. Pang H, Zhang J, Mouratidis K (2009) Scalable verification for outsourced dynamic databases. Proceedings of the 35th international conference on very large data bases, 2009. ACM, pp 802–813

    Google Scholar 

  19. Xie M, Wang H, Yin J, Meng X (2007) Integrity auditing of outsourced data. Proceedings of the 33rd international conference on very large data bases, 2007. ACM, pp 782–793

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Bouganim, L., Guo, Y. (2011). Database Encryption. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_677

Download citation