Applications of cryptography in database: a review

H Xu, K Thakur, AS Kamruzzaman… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Cryptography is the foundation and core of network security. Privacy protection, sensitive
information is particularly important, so whether it is system development or app …

A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata

A Waqar, A Raza, H Abbas, MK Khan - Journal of Network and Computer …, 2013 - Elsevier
In the rising paradigm of cloud computing, attainment of sustainable levels of cloud users'
trust in using cloud services is directly dependent on effective mitigation of its associated …

Security issues in data warehouse: a systematic review

A Gosain, A Arora - Procedia Computer Science, 2015 - Elsevier
Abstract As Data Warehouse store huge amount of data with the span of more than decades,
the security of this huge information base is crucial for the sustainability and reliability of data …

MV-OPES: Multivalued-order preserving encryption scheme: A novel scheme for encrypting integer value to many different values

H Kadhem, T Amagasa, H Kitagawa - IEICE TRANSACTIONS on …, 2010 - search.ieice.org
MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting
Integer Value to Many Different Values Page 1 2520 IEICE TRANS. INF. & SYST., VOL.E93–D …

Processing OLAP queries over an encrypted data warehouse stored in the cloud

CC Lopes, VC Times, S Matwin, RR Ciferri… - Data Warehousing and …, 2014 - Springer
Several studies deal with mechanisms for processing transactional queries over encrypted
data. However, little attention has been devoted to determine how a data warehouse (DW) …

Mechanism for securing cloud based data warehouse schema

A Arora, A Gosain - International Journal of Information Technology, 2021 - Springer
Several studies have recommended encryption of data for securing Data Warehouse (DW)
stored in hostile cloud networks. Most of the published work on encrypted DWs encrypts the …

[PDF][PDF] Protection of web application against SQL injection attacks

S Panda, S Ramani - … Journal of Modern Engineering Research (IJMER), 2013 - Citeseer
SQL injection attack is the most common attack in websites now-a-days. Some malicious
codes gets injected to the database by unauthorized users and because of this attack, the …

Spectrum-base fault localization by exploiting the failure path

HL Lu, R Gao, SK Huang… - 2016 International …, 2016 - ieeexplore.ieee.org
Software security is crucial in every aspect of information technology. As today's software
has become larger and more complex than ever before, software fault localization has …

Classification of various security techniques in databases and their comparative analysis

H Kayarkar - arXiv preprint arXiv:1206.4124, 2012 - arxiv.org
Data security is one of the most crucial and a major challenge in the digital world. Security,
privacy and integrity of data are demanded in every operation performed on internet …

[PDF][PDF] Privacy and security in online examination systems

O Zughoul, HM Jani, A Shuib… - Journal of Computer …, 2013 - academia.edu
A new method for key generation using Data Encryption Standard (DES) is proposed in
order to make it more secure for Online Examination System (OES). Privacy and security are …