Call for Oracle support & training (800) 766-1884
Free Oracle Tips

Home
Corporate Oracle Training
Custom Oracle Training
Oracle New Features Training
Advanced Oracle DBA Classes
Oracle Tuning Courses
Oracle Tips & Tricks
Oracle Training Links
Oracle Training Links
Oracle Training Links

We are top for USA Oracle Training Clients

 

Free Oracle Tips


 
HTML Text AOL

Free Oracle App Server Tips


 
HTML Text

Oracle support

Oracle training

Oracle tuning

Rednecks!

Remote Oracle

Custom Oracle Training

 

   
  Oracle Tips by Burleson

Chapter 6 Oracle Encryption

    end loop;
    return v_key;
end;
/

So, we now have a procedure to generate the key and encrypt the data, the two very important steps in building an encryption system. The next step is to build one.

Building an Encrypted System

In the example system, we will take the case of the table claim_line into account. Some of the information in the table is identified as PHI, and therefore may be a good candidate for encryption. One such field is procedure codes (procedure_code). This field holds the diagnosis of diseases or other diagnostic information done on the user, and is therefore extremely sensitive as per HIPAA regulations. Other fields in other tables may be Credit Card Numbers, Social Security Numbers, etc.

The usual approach is to generate a specific key for a specific value, and store that key in a separate place. To make it simple, we can use a single key for a single record of claim_line table, regardless of how many columns are to be encrypted.

Our key holding table will then have to hold the row identifier of the claim line table, and the key used to encrypt data in that row. The row identifier could be the primary key, or some other set of columns to uniquely identify a row. To make it more generic, we can have a single table to hold all the keys or all the tables, partitioned on the table_name column. For the sake of this example, assume there is one table to hold keys per
 

The above text is an excerpt from:

Oracle Privacy Security Auditing

The Final Word on Oracle Security

 

This is the only authoritative book on Oracle Security, Oracle Privacy, and Oracle Auditing written by two of the world’s leading Oracle Security experts.

This indispensable book is only

$39.95

 and has an immediate download of working security scripts:

 

http://rampant-books.com/book_2003_2_audit.htm



 
 
 
 

Oracle performance tuning book

 

 

Oracle performance tuning software

 
Oracle performance tuning software
 
Oracle performance Tuning 10g reference poster
 
Oracle training in Linux commands
 
Oracle training Excel
 
 
 
 

 

email BC:


Copyright © 1996 -  2014 by Burleson Inc. All rights reserved.

Oracle® is the registered trademark of Oracle Corporation.