KEMBAR78
Data encryption in database management system | PPTX
Data encryption
Presented by: Rabin BK
BSc.CSIT 4th Semester
1
Content
• Introduction
• Roles of Encryption
• The process of Encryption
• Levels of Data Encryption
• Advantages
• Disadvantages
2
Introduction
 A process that uses an algorithm to transform
data stored in a database into "cipher text"
that is incomprehensible without first being
decrypted
 The purpose of database encryption is to
protect the data stored in a database from
being accessed by individuals with potentially
"malicious" intentions
3
 Data decryption translates data into another form, or code, so that only
people with access to a secret key (formally called a decryption key) or
password can read it
The role of Encryption
Most database security techniques focus on controlling access
passwords, privileges, encrypting data as it travels
There is much less focus on protecting data at rest (data in
storage)
Encryption is increasingly being used to protect data in storage
which includes backups and all the pen drives, portable hard
drives, mobiles that get lost or stolen
Encryption is often described as 'the last line of defense'
4
The Encryption Process
5
Levels of Data Encryption
6
• Transparent/External database encryption
– It is used to encrypt an entire database, which therefore involves encrypting
"data at rest".
– Data at rest can generally be defined as "inactive" data that is not currently
being edited or pushed across a network
– Transparent Database Encryption ensures that the data on physical storage
media cannot be read by malicious individuals that may have the intention
to steal them
– It does not protect data in transit nor data in use
– TDE usually encrypts an entire database and requires a dedicated database
Levels of Data Encryption
7
• Column-level encryption
– A method of database encryption in which the information in every
cell (or data field) in a particular column has the same password for
access, reading, and writing purposes.
– The main disadvantage associated with column-level database
encryption is speed, or a loss thereof.
– Encrypting separate columns with different unique keys in the same
database can cause database performance to decrease, and additionally
also decreases the speed at which the contents of the database can be
indexed or searched
Levels of Data Encryption
8
• Field-level encryption
– Field-level encryption is the ability to encrypt data in specific data
fields.
– Once a field is chosen, all the data in that field will automatically be
encrypted.
– Encryption can be done using either secret or public keys.
– Field-Level Encryption does not require a dedicated database
Disadvantages of encryption
9
There are following problems of Encryption:
• Key management (i.e. keeping keys secret) is a problem. Even in public-key
encryption the decryption key must be kept secret.
• Even in a system that supports encryption, data must often be processed in
plaintext form. Thus sensitive data may still be accessible to transaction
programs.
• Encrypting data gives rise to serious technical problems at the level of
physical storage organization. For example indexing over data, which is
stored in encrypted form, can be very difficult.
Advantages of Encryption
10
• Encryption Provides Security for Data at All Times
– Encryption works during data transport, no matter where data is stored or
how it is used.
• Encrypted Data Maintains Integrity
– Prevents data from being altered by unknown user
• Encryption Protects Privacy
– Maintains data privacy by encrypting the data
• Encryption Protects Data across Devices
– Encryption technology can help protect store data across all devices, even
during transfer. Additional security measures like advanced authentication
discourages unauthorized users.
References
http://ecomputernotes.com/database-system/adv-database/data-
encryption
https://www.thalesesecurity.com/solutions/use-case/data-
security-and-encryption/database-security
https://digitalguardian.com/blog/what-data-encryption
https://www.smartdatacollective.com/5-advantages-using-
encryption-technology-data-protection/
https://help.salesforce.com/articleView?id=mc_overview_faq_f
le_vs_tde.htm&type=5
https://en.wikipedia.org/wiki/Database_encryption 11
Any Queries
12

Data encryption in database management system

  • 1.
    Data encryption Presented by:Rabin BK BSc.CSIT 4th Semester 1
  • 2.
    Content • Introduction • Rolesof Encryption • The process of Encryption • Levels of Data Encryption • Advantages • Disadvantages 2
  • 3.
    Introduction  A processthat uses an algorithm to transform data stored in a database into "cipher text" that is incomprehensible without first being decrypted  The purpose of database encryption is to protect the data stored in a database from being accessed by individuals with potentially "malicious" intentions 3  Data decryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it
  • 4.
    The role ofEncryption Most database security techniques focus on controlling access passwords, privileges, encrypting data as it travels There is much less focus on protecting data at rest (data in storage) Encryption is increasingly being used to protect data in storage which includes backups and all the pen drives, portable hard drives, mobiles that get lost or stolen Encryption is often described as 'the last line of defense' 4
  • 5.
  • 6.
    Levels of DataEncryption 6 • Transparent/External database encryption – It is used to encrypt an entire database, which therefore involves encrypting "data at rest". – Data at rest can generally be defined as "inactive" data that is not currently being edited or pushed across a network – Transparent Database Encryption ensures that the data on physical storage media cannot be read by malicious individuals that may have the intention to steal them – It does not protect data in transit nor data in use – TDE usually encrypts an entire database and requires a dedicated database
  • 7.
    Levels of DataEncryption 7 • Column-level encryption – A method of database encryption in which the information in every cell (or data field) in a particular column has the same password for access, reading, and writing purposes. – The main disadvantage associated with column-level database encryption is speed, or a loss thereof. – Encrypting separate columns with different unique keys in the same database can cause database performance to decrease, and additionally also decreases the speed at which the contents of the database can be indexed or searched
  • 8.
    Levels of DataEncryption 8 • Field-level encryption – Field-level encryption is the ability to encrypt data in specific data fields. – Once a field is chosen, all the data in that field will automatically be encrypted. – Encryption can be done using either secret or public keys. – Field-Level Encryption does not require a dedicated database
  • 9.
    Disadvantages of encryption 9 Thereare following problems of Encryption: • Key management (i.e. keeping keys secret) is a problem. Even in public-key encryption the decryption key must be kept secret. • Even in a system that supports encryption, data must often be processed in plaintext form. Thus sensitive data may still be accessible to transaction programs. • Encrypting data gives rise to serious technical problems at the level of physical storage organization. For example indexing over data, which is stored in encrypted form, can be very difficult.
  • 10.
    Advantages of Encryption 10 •Encryption Provides Security for Data at All Times – Encryption works during data transport, no matter where data is stored or how it is used. • Encrypted Data Maintains Integrity – Prevents data from being altered by unknown user • Encryption Protects Privacy – Maintains data privacy by encrypting the data • Encryption Protects Data across Devices – Encryption technology can help protect store data across all devices, even during transfer. Additional security measures like advanced authentication discourages unauthorized users.
  • 11.
  • 12.