2005
DOI: 10.2139/ssrn.670561
|View full text |Cite
|
Sign up to set email alerts
|

Database Encryption - How to Balance Security with Performance

Abstract: Encryption can provide strong security for data at rest, but developing a database encryption strategy must take many factors into consideration. Organizations must balance between the requirement for security and the desire for excellent performance. Encryption at the database level, versus application level and file level has proved to be the ideal method to protect sensitive data and deliver performance. There are a multitude of architectures and techniques to improve performance: the alternatives fall into… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2006
2006
2018
2018

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 28 publications
(16 reference statements)
0
8
0
Order By: Relevance
“…Author [3] compares how different protection, software or hardware implementations of the database affect the relationship between the level of security and performance. In their research they had discovered that AES algorithm's performances are better than RSA's or Blowfish's.…”
Section: State Of the Artmentioning
confidence: 99%
“…Author [3] compares how different protection, software or hardware implementations of the database affect the relationship between the level of security and performance. In their research they had discovered that AES algorithm's performances are better than RSA's or Blowfish's.…”
Section: State Of the Artmentioning
confidence: 99%
“…AES algorithm is chosen to be used for encryption/decryption due to its performance and variable key length (128, 192 and 256 bits). Based on the work of (Mattsson, 2005) AES is preferred to be used for security and for performance. An example for symmetric algorithms performance in Java is shown in Figure 7, which confirms that AES is faster even if we compare it with the Triple DES algorithm, which is well known for symmetric encryption processes.…”
Section: Performancementioning
confidence: 99%
“…where α is the ID (i.e., USN) of a job that is last originated in the system and β is the largest ID of a job in . As previously mentioned, these delays may be caused by complex interactions between heterogeneous resource hardware, software, networking and security [36]. It can be understood that the reliability criterion is used to measure the performance robustness of a resource.…”
Section: E Defining Qos Criterionmentioning
confidence: 99%