Font Size: a A A

Database Encryption Technology And Its Applications In Oracle

Posted on:2007-12-27Degree:MasterType:Thesis
Country:ChinaCandidate:H Y ZhuangFull Text:PDF
GTID:2208360185471917Subject:Computer applications
Abstract/Summary:PDF Full Text Request
With the development of the network technology and the increase of the information processes, we have to face huge amounts of data everyday. Data become more and more important either to the banks, the department of electric power, the statistic bureau, the insurance agent, or to some other enterprises of whose main work is information processes. So people give more prominences to the security of database now. Threats to the databases come not only from outside but also from inside and inner threats may be more serious at present time. But protections of network and operation system level are incapable of such attacks. Under such a circumstance, to protect static confidential data, to hide sensitive data from DBA, to obey rules like FCI, to add a last line of defenses, to protect sensitive data in external media, most of the enterprises consider database encryption as an effective and chief measure to protect their data in databases.There still have many problems to be considered in the implementation of database encryption. For example, the problem of key management, the balance between security and performance, the choice of arithmetic and the choice of granularity and so on.At first the paper gives a summary of the security of the database. Then it makes a analysis of database encryption techniques and then summarizes implementation of database encryption techniques. At last, it discusses the scheme of implement of database encryption inside oracle 10g and gives the code of the scheme. As a result of my research, you can perform your database encryption scheme inside DBMS or outside DBMS. The two schemes are all feasible but different in performance, flexibility and complexity. In practical, the requirement analysis should be considered as the most important standard to choose database encryption scheme. And to take a long view of the matter, if database encryption can be planned from the very beginning of the design of the DBMS, it should be helpful to resolve the problem of data security in database.
Keywords/Search Tags:Database Encryption, Data Security, Encryption-key Management, Database, Encryption
PDF Full Text Request
Related items