Related Concepts
Definition
Database encryption refers to the use of encryption techniques to transform a plain text database into a (partially) encrypted database, thus making it unreadable to anyone except those who possess the knowledge of the encryption key(s).
Theory
Database security encompasses three main properties: confidentiality, integrity, and availability. Roughly speaking, the confidentiality property enforces predefined restrictions while accessing the protected data, thus preventing disclosure to unauthorized persons. The integrity property guarantees that the data cannot be corrupted in an invisible way. Finally, the availability property ensures timely and reliable access to the database.
To preserve data confidentiality, enforcing access control policies defined on the database management system (DBMS) is a prevailing method. An access control policy, that is to say a set of authorizations, can take different forms depending on the underlying...
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsRecommended Reading
Hacigümüs H, Iyer B, Li C, Mehrotra S (2002) Providing database as a service. In: International conference on data engineering (ICDE). IEEE Computer Society, Washington, DC, pp 29–39
Agrawal R, Kiernan J, Srikant R, Yirong Xu (2002) Hippocratic databases. In: Proceedings of the 28th international conference on Very Large Data Bases. Morgan Kaufmann, pp 143–154
Damiani E, De Capitani Vimercati S, Jajodia S, Paraboschi S, Samarati P (2003) Balancing confidentiality and efficiency in untrusted relational dbms. In: Proceedings of the 10th ACM conference on computer and communications security. ACM, New York, pp 93–102
Bouganim L, Pucheral P (2002) Chip-secured data access: confidential data on untrusted servers. In: Proceedings of the 28th international conference on very large data bases. Morgan Kaufmann, pp 131–142
Hsueh S (2008) Database encryption in SQL server 2008 enterprise edition. SQL server technical article, 2008. December 29, 2010. http://msdn.microsoft.com/en-us/library/cc278098.aspx
Oracle Corporation (2009) Oracle advanced security transparent data encryption best practices. White Paper, 2009
Oracle Corporation (2001) Database encryption in Oracle9i. White Paper, 2001
IBM corporation (2007) IBM database encryption expert: securing data in DB2, 2007
Sybase Inc (2008) Sybase adaptive server enterprise encryption option: protecting sensitive data, 2008. December 29, 2010. http://www.sybase.com
Mattsson U (2004) Transparent encryption and separation of duties for enterprise databases: a practical implementation for field level privacy in databases. Protegrity Technical Paper. 2004. December 29, 2010. http://www.protegrity.com/whitepapers
RSA Security company (2002) Securing data at rest: developing a database encryption strategy. Whiter Paper, 2002
Safenet (2009) Database encryption, 2009. December 29, 2010. http://www.safenet-inc.com/products/data-protection/database-protection/
Hacigumus H, Iyer BR, Mehrotra S, Effcient execution of aggregation queries over encrypted relational databases. In: DASFAA. Springer, pp 125–136
Chung SS, Ozsoyoglu G (2006) Anti-tamper databases: processing aggregate queries over encrypted databases. In: Proceedings of the 22nd international conference on data engineering workshops. Washington, 2006. IEEE, pp 98–107
Agrawal R, Kiernan J, Srikant R, and Yirong Xu, Order preserving encryption for numeric data. Proceedings of the 2004 ACM SIGMOD international conference on management of data. ACM, New York, pp 563–574
Ge T, Zdonik S (2007) Fast, secure encryption for indexing in a column-oriented dbms. IEEE 23rd international conference on data engineering. 2007. IEEE, pp 676–685
Li F, Hadjieleftheriou M, Kollios G, Reyzin L (2006) Dynamic authenticated index structures for outsourced databases. Proceedings of the 2006 ACM SIGMOD international conference on management of data. ACM, New York, pp 121–132
Pang H, Zhang J, Mouratidis K (2009) Scalable verification for outsourced dynamic databases. Proceedings of the 35th international conference on very large data bases, 2009. ACM, pp 802–813
Xie M, Wang H, Yin J, Meng X (2007) Integrity auditing of outsourced data. Proceedings of the 33rd international conference on very large data bases, 2007. ACM, pp 782–793
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Bouganim, L., Guo, Y. (2011). Database Encryption. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_677
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_677
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering