2019
DOI: 10.29055/jcms/992
|View full text |Cite
|
Sign up to set email alerts
|

Protection of Data Stored in Transparent Database System using Encryption

Abstract: In transparent database data are stored at different severs which is easily visible and accessible to every user. End users usually access information through applications that intermediate between the user and the database. These applications provide interface to access the database system i.e. transparent to end users. This is expected and even logical aspect of the nature of most database management systems (DBMS). There is always possibility of data loss and data theft by an unauthorized user. Now-a-days r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Indeed, many solutions have been developed in order to resolve this problem. For instance, the keys protection solutions implemented at DBMSs such as Oracle, Ms SQL Server and My SQL are mainly based on the use of "Wallets", Hardware Security Module (HSM) and "Security server" [11][12][13][14]. In fact, each one of these solutions has advantages and major limits, as have already explained in more detail in our previous work [8,15].…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, many solutions have been developed in order to resolve this problem. For instance, the keys protection solutions implemented at DBMSs such as Oracle, Ms SQL Server and My SQL are mainly based on the use of "Wallets", Hardware Security Module (HSM) and "Security server" [11][12][13][14]. In fact, each one of these solutions has advantages and major limits, as have already explained in more detail in our previous work [8,15].…”
Section: Introductionmentioning
confidence: 99%