2023
DOI: 10.1109/access.2023.3248300
|View full text |Cite
|
Sign up to set email alerts
|

Embedded Devices Security: Design and Implementation of a Light RDBMS Encryption Utilizing Multi-Core Processors

Abstract: The pervasive proliferation of embedded, mobile, and IoT devices continue to change our lifestyle dramatically. However, the huge increase in these devices has come with critical breaches to data resting inside them. Many types of such data are considered to be sensitive and confidential. Because the most sensitive data of such devices are resting in databases, focusing on encrypting SQLite databases will be more efficient than full disk encryption (FDE). While SQLite is a very popular, lightweight, and easy-t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0
1

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 37 publications
0
1
0
1
Order By: Relevance
“…The evaluation was conducted using a single-core CVA6-based SoC (@50 MHz), with the RISC-V hypervisor extension, on a Genesys 2 FPGA board. The software stack includes OpenSBI (version 1.1), Bao hypervisor (version 1.0) [25], [26], and Linux (version 6.1-rc4). Bao and OpenSBI were compiled using SiFive's GCC version 10.1.0 for riscv64 unknown targets, and Linux was compiled using GNU RISC-V GCC version 10.3.0 for riscv64 Linux targets.…”
Section: Discussionmentioning
confidence: 99%
“…The evaluation was conducted using a single-core CVA6-based SoC (@50 MHz), with the RISC-V hypervisor extension, on a Genesys 2 FPGA board. The software stack includes OpenSBI (version 1.1), Bao hypervisor (version 1.0) [25], [26], and Linux (version 6.1-rc4). Bao and OpenSBI were compiled using SiFive's GCC version 10.1.0 for riscv64 unknown targets, and Linux was compiled using GNU RISC-V GCC version 10.3.0 for riscv64 Linux targets.…”
Section: Discussionmentioning
confidence: 99%
“…Kemajuan yang dipercepat dalam komunikasi, jaringan, dan teknologi informasi membentuk bisnis global, dan diperkirakan akan terus mengubah struktur bisnis di masa mendatang. Perkembangan ini memiliki banyak keuntungan dan kerugian bagi semua pemangku kepentingan organisasi [1][2][3]. Manajemen sistem informasi semakin mempertimbangkan keamanan dan privasi informasi karena potensi masalah yang dapat mengancam keamanan data informasi.…”
unclassified