0% found this document useful (0 votes)
74 views

Database Security

Transparent Data Encryption (TDE) is a technology that encrypts databases on disk and backup media to securely protect data. TDE provides transparent encryption of data without requiring changes to applications or database schemas. It encrypts data when stored and decrypts it when accessed by authorized parties. TDE is used by database technologies like Microsoft SQL Server and Oracle to encrypt database contents and protect data at rest and in transit.

Uploaded by

raj
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views

Database Security

Transparent Data Encryption (TDE) is a technology that encrypts databases on disk and backup media to securely protect data. TDE provides transparent encryption of data without requiring changes to applications or database schemas. It encrypts data when stored and decrypts it when accessed by authorized parties. TDE is used by database technologies like Microsoft SQL Server and Oracle to encrypt database contents and protect data at rest and in transit.

Uploaded by

raj
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Abstract

The present study deals with Transparent Data Encryption which is a technology used to

solve the problems of security of data. Transparent Data Encryption means encrypting

databases on hard disk and on any backup media. Transparent Data Encryption provides

transparent, standards-based security that protects data on the network, on disk and on backup

media. It is easy and effective protection of stored data by transparently encrypting data.

Transparent Data Encryption can be used to provide high levels of security to columns, table

and tablespace that is database files stored on hard drives or floppy disks or CD’s, and other

information that requires protection. It is the technology used by Microsoft SQL Server 2008,

Oracle 10g and 11g to encrypt database contents. The term encryption means the piece of

information encoded in such a way that it can only be decoded read and understood by people

for whom the information is intended. The crucial role data plays in any organization itself

explains its importance. So it is exposed to grave threats of theft, misuse or loss. This study is

aimed to deal with the most critical of those threats to which database is vulnerable by

focusing on Transparent Data Encryption (TDE). TDE is used to prevent unauthorized access

to confidential database, reduce the cost of managing users, and facilitate privacy

managements. This latest technology enables users’ i.e. database administrators to counter the

possible threats to security of data. The operation of securing Data-in-Rest involves

transforming sensitive data intounintelligible forms, so that it is only readable by authorized

parties. Sensitive data are encryptedas soon as it is stored in the database. Upon leaving the

database, however, the data will betransformed back into plain text. As such, the data are

always at risk of disclosure while intransfer, excepting if a secure communication channel is


set between the sender application andthe database server. The database, or eavesdrop the

Integrity controls Encrypting.Encrypting Data-in-Motion solve the problem raised up by the

former database securingcategory. It plays an important role to protect data while they are

being transmitted through communication channels. Critical information is protected through

a secure connection established by the two communicating endpoints. To securely transmit

Data-in-Motion; there are a few options applicable, such as Secure Internet Protocol (IP Sec).

The most common standards that database vendors adapted to be Secure Sockets Layer (SSL)

or Transport Layer Security (TLS).

High-speed performance is crucial for Data Redaction because the target databases typically

will be production systems. Data needs to be transformed on-the-fly at runtime, without

altering data stored on disk or in caches and buffers. Because the transformations will execute

on production environments and will be repeated frequently, the performance overhead must

be small. [6] One important performance characteristic of Data Redaction is that it supports

only data transformations with proven high performance. These are a subset of all the

possible operations that could be used to transform data in non-production environments.

This specific subset avoids long running and processor intensive operations. e use the key

concepts of security dictionary, type transparent cryptography and propose solutions on how

to transparently store and search encrypted database fields. In this paper we will outline the

different strategies for encrypting stored data so you can make the decision that is best to use

in each different situation, for each individual field in your database to be able to practically

handle different security and operating requirements. Application code and database schemas

are sensitive to changes in the data type and data length. The papers presents a policy driven

solution that allows transparent data level encryption that does not change the data field type

or length. We focus on how to integrat (Lagarias, 2017)e modern cryptography technology

into a relational database management system to solve some major security problems.
Bibliography

Carl Hamacher, Z. V. (2014). Computer Organizatio. McGraw hill.

Deshmukh, A. P. (2011). Transparent Data Encryption- Solution for Security of Database

Contents. (IJACSA) International Journal of Advanced Computer Science and

Applications, .

Lagarias, J. C. (2017). Pseudo-random number generators in cryptography and number

theory. . InCryptology and Computationa.

N R Adam, J. C. (2015). Security-control methods for statistical databases. ACMComputing

Surveys.

Otey, M. (2015). Microsoft SQL Server 2008 New Features. McGraw Hill Osborn Media, 2

Edition.

R Agrawal, J. K. (2018). Hippocratic databases. Proc. of the 28th Int'l Conference on Very

Large Databases.

Rob Walters, C. K. (2015). Database Encryption and keymanagement for Microsoft SQL

Server 2008”, . Create Space.

Ron Ben Natan. (2015). How to Secure and Audit Oracle 10g and. Auerbach Publications,.

You might also like