Conclusions
In this paper we investigate the role cryptography
can play in database security. We analyze the security
features of current RDBMSs and point out their weaknesses. We introduce the key concept of security
dictionary and proposed several secure user management
and encryption methods based upon the new
concept.
Another important research problem is how to do
database operation against encrypted columns, such
as indexing and join. We will discuss this in a forthcoming
paper.