Encrypting Database Content with User-Defined Function

Article Preview

Abstract:

Sensitive data in database should be encrypted to protect it from malicious access. Do this in application is hard and costly. Utilizing the user-defined function technology supported by database management system, data encryption could be done separately and transparently for application. The principle and system architecture of encrypting database content with user-defined function is introduced, and the method handling long object encrypting is discussed specially. Experiments show that the proposed method is easy to implement, effective in system running and application development, and applicable for both new developing and old developed application.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3203-3206

Citation:

Online since:

March 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Information on http: /nosql-database. org.

Google Scholar

[2] P. J. Sadalage and M. Fowler: NoSQL distilled : a brief guide to the emerging world of polyglot persistence (Addison-Vesley, Upper Saddle River, NJ 2012).

Google Scholar

[3] S. Peter and S. Mark: Handbook of Information and Communication Security (Springer Berlin Heidelberg, Germany 2010).

Google Scholar

[4] B. Huang, T. Xie and Y. Ma. Anti SQL Injection with Statements Sequence Digest: the Spring World Congress on Engineering and Technology (2012), p.563.

DOI: 10.1109/scet.2012.6341889

Google Scholar

[5] Information on http: /en. wikipedia. org/wiki/User-defined_function.

Google Scholar

[6] Y. Zhang, W. Li and X. Niu. A method of bucket index over encrypted character data in database: the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2007), p.186.

DOI: 10.1109/iih-msp.2007.30

Google Scholar

[7] R. A. Popa, C. M. S. Redfield, N. Zeldovich and H. Balakrishnan. CryptDB: Protecting Confidentiality with Encrypted Query Processing: the 23rd ACM Symposium on Operating Systems Principles (2011), p.85.

DOI: 10.1145/2043556.2043566

Google Scholar

[8] Information on http: /en. wikipedia. org/wiki/View_(SQL).

Google Scholar