SlideShare a Scribd company logo
2
Most read
4
Most read
12
Most read
Data encryption
Presented by: Rabin BK
BSc.CSIT 4th Semester
1
Content
• Introduction
• Roles of Encryption
• The process of Encryption
• Levels of Data Encryption
• Advantages
• Disadvantages
2
Introduction
 A process that uses an algorithm to transform
data stored in a database into "cipher text"
that is incomprehensible without first being
decrypted
 The purpose of database encryption is to
protect the data stored in a database from
being accessed by individuals with potentially
"malicious" intentions
3
 Data decryption translates data into another form, or code, so that only
people with access to a secret key (formally called a decryption key) or
password can read it
The role of Encryption
Most database security techniques focus on controlling access
passwords, privileges, encrypting data as it travels
There is much less focus on protecting data at rest (data in
storage)
Encryption is increasingly being used to protect data in storage
which includes backups and all the pen drives, portable hard
drives, mobiles that get lost or stolen
Encryption is often described as 'the last line of defense'
4
The Encryption Process
5
Levels of Data Encryption
6
• Transparent/External database encryption
– It is used to encrypt an entire database, which therefore involves encrypting
"data at rest".
– Data at rest can generally be defined as "inactive" data that is not currently
being edited or pushed across a network
– Transparent Database Encryption ensures that the data on physical storage
media cannot be read by malicious individuals that may have the intention
to steal them
– It does not protect data in transit nor data in use
– TDE usually encrypts an entire database and requires a dedicated database
Levels of Data Encryption
7
• Column-level encryption
– A method of database encryption in which the information in every
cell (or data field) in a particular column has the same password for
access, reading, and writing purposes.
– The main disadvantage associated with column-level database
encryption is speed, or a loss thereof.
– Encrypting separate columns with different unique keys in the same
database can cause database performance to decrease, and additionally
also decreases the speed at which the contents of the database can be
indexed or searched
Levels of Data Encryption
8
• Field-level encryption
– Field-level encryption is the ability to encrypt data in specific data
fields.
– Once a field is chosen, all the data in that field will automatically be
encrypted.
– Encryption can be done using either secret or public keys.
– Field-Level Encryption does not require a dedicated database
Disadvantages of encryption
9
There are following problems of Encryption:
• Key management (i.e. keeping keys secret) is a problem. Even in public-key
encryption the decryption key must be kept secret.
• Even in a system that supports encryption, data must often be processed in
plaintext form. Thus sensitive data may still be accessible to transaction
programs.
• Encrypting data gives rise to serious technical problems at the level of
physical storage organization. For example indexing over data, which is
stored in encrypted form, can be very difficult.
Advantages of Encryption
10
• Encryption Provides Security for Data at All Times
– Encryption works during data transport, no matter where data is stored or
how it is used.
• Encrypted Data Maintains Integrity
– Prevents data from being altered by unknown user
• Encryption Protects Privacy
– Maintains data privacy by encrypting the data
• Encryption Protects Data across Devices
– Encryption technology can help protect store data across all devices, even
during transfer. Additional security measures like advanced authentication
discourages unauthorized users.
References
http://ecomputernotes.com/database-system/adv-database/data-
encryption
https://www.thalesesecurity.com/solutions/use-case/data-
security-and-encryption/database-security
https://digitalguardian.com/blog/what-data-encryption
https://www.smartdatacollective.com/5-advantages-using-
encryption-technology-data-protection/
https://help.salesforce.com/articleView?id=mc_overview_faq_f
le_vs_tde.htm&type=5
https://en.wikipedia.org/wiki/Database_encryption 11
Any Queries
12

More Related Content

PPTX
Recovery system
PPT
Oracle Transparent Data Encryption (TDE) 12c
PPTX
Concurrency Control in Database Management System
PPT
Database security
 
ODP
Partitioning
PDF
Introduction to distributed file systems
PPTX
Homogeneous ddbms
PPT
Distributed Database System
Recovery system
Oracle Transparent Data Encryption (TDE) 12c
Concurrency Control in Database Management System
Database security
 
Partitioning
Introduction to distributed file systems
Homogeneous ddbms
Distributed Database System

What's hot (20)

PPTX
Query processing in Distributed Database System
PPTX
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
PPTX
Temporal databases
PPTX
Distributed DBMS - Unit 6 - Query Processing
PPTX
User, roles and privileges
PPTX
DISTRIBUTED DATABASE WITH RECOVERY TECHNIQUES
PPT
DB security
PPTX
Data warehouse physical design
PPT
Oracle GoldenGate
PPTX
Oracle architecture ppt
PPTX
Distributed database management system
PPTX
Distributed file system
PPT
File organization
PPTX
Denormalization
PPTX
Replication Techniques for Distributed Database Design
PPTX
Introduction to distributed database
PPT
Distributed data processing
PPTX
Distributed design alternatives
PDF
How to use 23c AHF AIOPS to protect Oracle Databases 23c
PPTX
Distributed datababase Transaction and concurrency control
Query processing in Distributed Database System
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Temporal databases
Distributed DBMS - Unit 6 - Query Processing
User, roles and privileges
DISTRIBUTED DATABASE WITH RECOVERY TECHNIQUES
DB security
Data warehouse physical design
Oracle GoldenGate
Oracle architecture ppt
Distributed database management system
Distributed file system
File organization
Denormalization
Replication Techniques for Distributed Database Design
Introduction to distributed database
Distributed data processing
Distributed design alternatives
How to use 23c AHF AIOPS to protect Oracle Databases 23c
Distributed datababase Transaction and concurrency control
Ad

Similar to Data encryption in database management system (20)

PPTX
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
PPTX
WBN_Securing Your IBM i_E_250300003.pptx
PPTX
Why Disk Level Encryption is Not Enough for Your IBM i
PPTX
Securing data
PDF
Encryption technology
PPTX
Secure_Data_Deduplication_Presentation.pptx
PPT
Database Security & Encryption
PPT
Formal Lecture.ppt
PDF
Database security technique with database cache
DOCX
Securing data at rest with encryption
PPTX
Streamlining Data Encryption While Maintaining IBM i Availability
DOCX
Confidential data storage and deletion
PPTX
Masking and Encryption Considerations.pptx
PPTX
Data security in clouds
PDF
Improving data confidentiality in personal computer environment using on line...
PPT
Data security
PDF
Multi-part Dynamic Key Generation For Secure Data Encryption
PDF
Hard Disk Encryptions
PPTX
Securing private keys
PPSX
Linux for Cybersecurity CYB110 - Unit 7.ppsx
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
WBN_Securing Your IBM i_E_250300003.pptx
Why Disk Level Encryption is Not Enough for Your IBM i
Securing data
Encryption technology
Secure_Data_Deduplication_Presentation.pptx
Database Security & Encryption
Formal Lecture.ppt
Database security technique with database cache
Securing data at rest with encryption
Streamlining Data Encryption While Maintaining IBM i Availability
Confidential data storage and deletion
Masking and Encryption Considerations.pptx
Data security in clouds
Improving data confidentiality in personal computer environment using on line...
Data security
Multi-part Dynamic Key Generation For Secure Data Encryption
Hard Disk Encryptions
Securing private keys
Linux for Cybersecurity CYB110 - Unit 7.ppsx
Ad

More from Rabin BK (20)

PPTX
Artificial Intelligence in E-commerce
PPTX
Three address code generation
PPTX
Consumer Oriented Application, Mercantile process and Mercantile models
PPTX
Clang compiler `
PPTX
Simple Mail Transfer Protocol
PPTX
HTML text formatting tags
PPTX
Object Relational Database Management System(ORDBMS)
PPTX
Kolmogorov Smirnov
PPTX
Job sequencing in Data Strcture
PPTX
Stack Data Structure
PPTX
Bluetooth
PPTX
Data Science
PPTX
Graphics_3D viewing
PPTX
Neural Netwrok
PPTX
Watermarking in digital images
PPTX
Heun's Method
PPTX
Mutual Exclusion
PPTX
Systems Usage
PPTX
Manager of a company
PPTX
Profile of Organizations
Artificial Intelligence in E-commerce
Three address code generation
Consumer Oriented Application, Mercantile process and Mercantile models
Clang compiler `
Simple Mail Transfer Protocol
HTML text formatting tags
Object Relational Database Management System(ORDBMS)
Kolmogorov Smirnov
Job sequencing in Data Strcture
Stack Data Structure
Bluetooth
Data Science
Graphics_3D viewing
Neural Netwrok
Watermarking in digital images
Heun's Method
Mutual Exclusion
Systems Usage
Manager of a company
Profile of Organizations

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Cloud computing and distributed systems.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Review of recent advances in non-invasive hemoglobin estimation
Advanced methodologies resolving dimensionality complications for autism neur...
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Machine learning based COVID-19 study performance prediction
GamePlan Trading System Review: Professional Trader's Honest Take
Mobile App Security Testing_ A Comprehensive Guide.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Empathic Computing: Creating Shared Understanding
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Cloud computing and distributed systems.
Understanding_Digital_Forensics_Presentation.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Dropbox Q2 2025 Financial Results & Investor Presentation
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Review of recent advances in non-invasive hemoglobin estimation

Data encryption in database management system

  • 1. Data encryption Presented by: Rabin BK BSc.CSIT 4th Semester 1
  • 2. Content • Introduction • Roles of Encryption • The process of Encryption • Levels of Data Encryption • Advantages • Disadvantages 2
  • 3. Introduction  A process that uses an algorithm to transform data stored in a database into "cipher text" that is incomprehensible without first being decrypted  The purpose of database encryption is to protect the data stored in a database from being accessed by individuals with potentially "malicious" intentions 3  Data decryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it
  • 4. The role of Encryption Most database security techniques focus on controlling access passwords, privileges, encrypting data as it travels There is much less focus on protecting data at rest (data in storage) Encryption is increasingly being used to protect data in storage which includes backups and all the pen drives, portable hard drives, mobiles that get lost or stolen Encryption is often described as 'the last line of defense' 4
  • 6. Levels of Data Encryption 6 • Transparent/External database encryption – It is used to encrypt an entire database, which therefore involves encrypting "data at rest". – Data at rest can generally be defined as "inactive" data that is not currently being edited or pushed across a network – Transparent Database Encryption ensures that the data on physical storage media cannot be read by malicious individuals that may have the intention to steal them – It does not protect data in transit nor data in use – TDE usually encrypts an entire database and requires a dedicated database
  • 7. Levels of Data Encryption 7 • Column-level encryption – A method of database encryption in which the information in every cell (or data field) in a particular column has the same password for access, reading, and writing purposes. – The main disadvantage associated with column-level database encryption is speed, or a loss thereof. – Encrypting separate columns with different unique keys in the same database can cause database performance to decrease, and additionally also decreases the speed at which the contents of the database can be indexed or searched
  • 8. Levels of Data Encryption 8 • Field-level encryption – Field-level encryption is the ability to encrypt data in specific data fields. – Once a field is chosen, all the data in that field will automatically be encrypted. – Encryption can be done using either secret or public keys. – Field-Level Encryption does not require a dedicated database
  • 9. Disadvantages of encryption 9 There are following problems of Encryption: • Key management (i.e. keeping keys secret) is a problem. Even in public-key encryption the decryption key must be kept secret. • Even in a system that supports encryption, data must often be processed in plaintext form. Thus sensitive data may still be accessible to transaction programs. • Encrypting data gives rise to serious technical problems at the level of physical storage organization. For example indexing over data, which is stored in encrypted form, can be very difficult.
  • 10. Advantages of Encryption 10 • Encryption Provides Security for Data at All Times – Encryption works during data transport, no matter where data is stored or how it is used. • Encrypted Data Maintains Integrity – Prevents data from being altered by unknown user • Encryption Protects Privacy – Maintains data privacy by encrypting the data • Encryption Protects Data across Devices – Encryption technology can help protect store data across all devices, even during transfer. Additional security measures like advanced authentication discourages unauthorized users.