Explore chapters and articles related to this topic
Encryption Services
Published in Ian Lim, E. Coleen Coolidge, Paul Hourani, Securing Cloud and Mobility, 2013
Ian Lim, E. Coleen Coolidge, Paul Hourani
Our recommendation is to choose table space encryption unless you have a very specific reason to use column space encryption. The performance, simplicity, and flexibility of using table space encryption outweigh most benefits offered by encrypting specific columns. Some auditors might argue that table space encryption is insufficient for protecting against database administrator access to data. Our advice is to clarify the requirements with the auditor and delineate the differences between encryption and database access control. Encryption provides protection for data at rest. Access management provides protection by only allowing the right individuals or applications to use the data. Access management is better served by deploying a database access management toolset, along with a strong access monitoring component.
An Overview of Data Privacy in Healthcare in the Current Age
Published in Ahmed Elngar, Ambika Pawar, Prathamesh Churi, Data Protection and Privacy in Healthcare, 2021
Reinaldo Padilha França, Ana Carolina Borges Monteiro, Rangel Arthur, Yuzo Iano
Moving data are information sent from one individual (patient) or private device to another via direct messages, e-mail or other means of exchanging data and messages. In that respect, that unencrypted data can be intercepted while moving from one location to another. Data at rest refers to that information stored somewhere, and not transported, i.e., being stored on hard disk, a removable disk, pen drive, on a local server or even mobile devices, such as notebooks, tablets and smartphones. Even so, the privacy and integrity of health data must be protected not only against external threats, but also against unauthorized access attempts (human attacks) from within the health institution’s network or digital ecosystem [41].
Smart Cities, Playable Cities, and Cybersecurity: A Systematic Review
Published in International Journal of Human–Computer Interaction, 2023
Gustav Verhulsdonck, Jennifer L. Weible, Susan Helser, Nancy Hajduk
Other research focused on limiting access to data as a means of enhancing security through several approaches such as location-dependent solutions and revoking users. Esposito et al. (2019) state that their location-dependent solution provides security and protects privacy as well by limiting access to data on a geo-encryption and geo-decryption system. This article proposes a location-based solution that encrypts and decrypts data only at specific locations to provide more security. The authors lay claim that this provides additional security for cloud storage of data-in-motion and data-at-rest in smart cities. A second article also promoted limiting access to data for security purposes. Fan et al. (2017) intended to improve security in multi-user cloud computing because cloud servers can be accessed by illegal users and data corrupted. They utilize ciphertext policy attribute-based encryption to limit access to cloud data. By revoking users, proxy keys are deleted and data cannot be accessed, improving security. These studies limited access or use of data through multiple means that were found to enhance security and in turn privacy.
NoSQL real-time database performance comparison
Published in International Journal of Parallel, Emergent and Distributed Systems, 2018
Diogo Augusto Pereira, Wagner Ourique de Morais, Edison Pignaton de Freitas
In general, all databases have the main expected features. However, some differences can be noticed:Only Couchbase server supports key/value data structure.Couchbase and RethinkDB support less programming languages than MongoDB.Couchbase offers a declarative query language called N1QL [22]. N1QL allows users to query documents in a language similar to SQL, with the power to sort, filter, and group data in a single query.MongoDB does not have by default an Administration UI. This feature is part of a separate product called Compass, which is available only for paid versions of MongoDB [23].RethinkDB does not support data encryption for the data at rest, only for authentication and transporting data (TLS).
Proxy re-encryption architect for storing and sharing of cloud contents
Published in International Journal of Parallel, Emergent and Distributed Systems, 2020
Dropbox file data at rest is encrypted using 256-bit Advanced Encryption Standard (AES). To protect data in transit between Dropbox apps (currently desktop, mobile, API, or web) and our servers, Dropbox uses Secure Sockets Layer (SSL)/Transport Layer Security (TLS) for data transfer, creating a secure tunnel protected by 128-bit or higher Advanced Encryption Standard (AES) encryption [46]. If Clients-A wants to share its file with Client-B, Client-A gives its private keys to Key-server and Key-server encrypt a file with Twofish and stores file in Dropbox in Client-B’s account. Same way Client-B share its file with Client-A. Figure 8, shows clients A and B can share each other’s file.