Comparative evaluation of different methods of "Homomorphic Encryption" and "Traditional Encryption" on a dataset with current problems and developments

11/18/2022
by   Tanvi S. Patel, et al.
0

A database is a prime target for cyber-attacks as it contains confidential, sensitive, or protected information. With the increasing sophistication of the internet and dependencies on internet data transmission, it has become vital to be aware of various encryption technologies and trends. It can assist in safeguarding private information and sensitive data, as well as improve the security of client-server communication. Database encryption is a procedure that employs an algorithm to convert data contained in a database into "cipher text," which is incomprehensible until decoded. Homomorphic encryption technology, which works with encrypted data, can be utilized in both symmetric and asymmetric systems. In this paper, we evaluated homomorphic encryption techniques based on recent highly cited articles, as well as compared all database encryption problems and developments since 2018. The benefits and drawbacks of homomorphic approaches were examined over classic encryption methods including Transparent Database Encryption, Column Level Encryption, Field Level Encryption, File System Level Encryption, and Encrypting File System Encryption in this review. Additionally, popular databases that provide encryption services to their customers to protect their data are also examined.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/10/2021

Equi-Joins Over Encrypted Data for Series of Queries

Encryption provides a method to protect data outsourced to a DBMS provid...
research
08/17/2018

Bitstream-Based JPEG Image Encryption with File-Size Preserving

An encryption scheme of JPEG images in the bitstream domain is proposed....
research
03/26/2018

SIG-DB: leveraging homomorphic encryption to Securely Interrogate privately held Genomic DataBases

Genomic data are becoming increasingly valuable as we develop methods to...
research
01/07/2019

Popular SQL Server Database Encryption Choices

This article gives an overview of different database encryption choices ...
research
07/04/2022

ID-based self-encryption via Hyperledger Fabric based smart contract

This paper offers a prototype of a Hyperledger Fabric-IPFS based network...
research
11/05/2020

A multi-level approach with visual information for encrypted H.265/HEVC videos

High-efficiency video coding (HEVC) encryption has been proposed to encr...
research
12/12/2018

Analysis and Consideration on Management of Encrypted Traffic

There are two seemingly contradicting trends in the current Internet: in...

Please sign up or login with your details

Forgot password? Click here to reset