Database Security
Database Security
The present study deals with Transparent Data Encryption which is a technology used to
solve the problems of security of data. Transparent Data Encryption means encrypting
databases on hard disk and on any backup media. Transparent Data Encryption provides
transparent, standards-based security that protects data on the network, on disk and on backup
media. It is easy and effective protection of stored data by transparently encrypting data.
Transparent Data Encryption can be used to provide high levels of security to columns, table
and tablespace that is database files stored on hard drives or floppy disks or CD’s, and other
information that requires protection. It is the technology used by Microsoft SQL Server 2008,
Oracle 10g and 11g to encrypt database contents. The term encryption means the piece of
information encoded in such a way that it can only be decoded read and understood by people
for whom the information is intended. The crucial role data plays in any organization itself
explains its importance. So it is exposed to grave threats of theft, misuse or loss. This study is
aimed to deal with the most critical of those threats to which database is vulnerable by
focusing on Transparent Data Encryption (TDE). TDE is used to prevent unauthorized access
to confidential database, reduce the cost of managing users, and facilitate privacy
managements. This latest technology enables users’ i.e. database administrators to counter the
parties. Sensitive data are encryptedas soon as it is stored in the database. Upon leaving the
database, however, the data will betransformed back into plain text. As such, the data are
former database securingcategory. It plays an important role to protect data while they are
Data-in-Motion; there are a few options applicable, such as Secure Internet Protocol (IP Sec).
The most common standards that database vendors adapted to be Secure Sockets Layer (SSL)
High-speed performance is crucial for Data Redaction because the target databases typically
altering data stored on disk or in caches and buffers. Because the transformations will execute
on production environments and will be repeated frequently, the performance overhead must
be small. [6] One important performance characteristic of Data Redaction is that it supports
only data transformations with proven high performance. These are a subset of all the
This specific subset avoids long running and processor intensive operations. e use the key
concepts of security dictionary, type transparent cryptography and propose solutions on how
to transparently store and search encrypted database fields. In this paper we will outline the
different strategies for encrypting stored data so you can make the decision that is best to use
in each different situation, for each individual field in your database to be able to practically
handle different security and operating requirements. Application code and database schemas
are sensitive to changes in the data type and data length. The papers presents a policy driven
solution that allows transparent data level encryption that does not change the data field type
into a relational database management system to solve some major security problems.
Bibliography
Applications, .
Surveys.
Otey, M. (2015). Microsoft SQL Server 2008 New Features. McGraw Hill Osborn Media, 2
Edition.
R Agrawal, J. K. (2018). Hippocratic databases. Proc. of the 28th Int'l Conference on Very
Large Databases.
Rob Walters, C. K. (2015). Database Encryption and keymanagement for Microsoft SQL
Ron Ben Natan. (2015). How to Secure and Audit Oracle 10g and. Auerbach Publications,.