{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T19:36:46Z","timestamp":1764963406949,"version":"3.46.0"},"reference-count":44,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T00:00:00Z","timestamp":1764374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Data security is essential for protecting sensitive information that could compromise both the sender and the receiver. Encryption mechanisms, such as the Advanced Encryption Standard (AES), play a key role in this protection. However, encrypting or decrypting data can significantly impact the performance of the database. This study aims to evaluate the impact of AES on the performance of SQL Server, Oracle, and MySQL when using Transparent Data Encryption (TDE) with the Transaction Processing Performance Council-H (TPC-H) benchmark at different Scale Factors. Performance was assessed using metrics such as elapsed time and system resource usage. In terms of scalability and performance efficiency, SQL Server proved to be the best among the databases tested. However, TDE introduced performance overhead compared to non-encryption test cases.<\/jats:p>","DOI":"10.3390\/cryptography9040077","type":"journal-article","created":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T18:42:02Z","timestamp":1764960122000},"page":"77","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Evaluation of the Impact of AES Encryption on Query Read Performance Across Oracle, MySQL, and SQL Server Databases"],"prefix":"10.3390","volume":"9","author":[{"given":"M\u00e1rcio","family":"Carvalho","sequence":"first","affiliation":[{"name":"Institute of Engineering, Polytechnic University of Coimbra, Rua da Miseric\u00f3rdia, Lagar dos Corti\u00e7os, S. Martinho do Bispo, 3045-093 Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7846-8397","authenticated-orcid":false,"given":"Filipe","family":"S\u00e1","sequence":"additional","affiliation":[{"name":"Institute of Engineering, Polytechnic University of Coimbra, Rua da Miseric\u00f3rdia, Lagar dos Corti\u00e7os, S. Martinho do Bispo, 3045-093 Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9660-2011","authenticated-orcid":false,"given":"Jorge","family":"Bernardino","sequence":"additional","affiliation":[{"name":"Institute of Engineering, Polytechnic University of Coimbra, Rua da Miseric\u00f3rdia, Lagar dos Corti\u00e7os, S. Martinho do Bispo, 3045-093 Coimbra, Portugal"},{"name":"Centre for Informatics and Systems, University of Coimbra (CISUC), Polo II, Pinhal de Marrocos, 3030-290 Coimbra, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Santos, R.J., Bernardino, J., and Vieira, M. (2011, January 27\u201329). A survey on data security in data warehousing: Issues, challenges and opportunities. Proceedings of the 2011 IEEE EUROCON-International Conference on Computer as a Tool, Lisbon, Portugal.","DOI":"10.1109\/EUROCON.2011.5929314"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Aslan, \u00d6., Aktu\u011f, S.S., Ozkan-Okay, M., Yilmaz, A.A., and Akin, E. (2023). A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions. Electronics, 12.","DOI":"10.3390\/electronics12061333"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1186\/s40537-021-00520-z","article-title":"Performance Testing on Transparent Data Encryption for SQL Server\u2019s and Efficiency","volume":"8","author":"Madyatmadja","year":"2021","journal-title":"J. Big Data"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Cuzzocrea, A., and Dayal, U. (2012, January 3\u20136). Evaluating the Feasibility Issues of Data Confidentiality Solutions from a Data Warehousing Perspective. Proceedings of the Data Warehousing and Knowledge Discovery: 14th International Conference, DaWaK 2012, Vienna, Austria.","DOI":"10.1007\/978-3-642-32584-7"},{"key":"ref_5","first-page":"1","article-title":"Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data","volume":"16","author":"Abdullah","year":"2017","journal-title":"Cryptogr. Netw. Secur."},{"key":"ref_6","unstructured":"Moulianitakis, F., and Asimakopoulos, K. (2019). Benchmarking Framework for Transparent Data Encryption Systems. [Master\u2019s Thesis, Lule\u00e5 University of Technology, Department of Computer Science, Electrical and Space Engineering]."},{"key":"ref_7","unstructured":"Santos, R.J., Rasteiro, D., Bernardino, J., and Vieira, M. (2013, January 22\u201325). A Specific Encryption Solution for Data Warehouses. Proceedings of the Database Systems for Advanced Applications: 18th International Conference, DASFAA 2013, Wuhan, China. Proceedings, Part II 18."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Lukaj, V., Catalfamo, A., Martella, F., Fazio, M., Villari, M., and Celesti, A. (2023, January 9\u201312). A NoSQL DBMS Transparent Data Encryption Approach for Cloud\/Edge Continuum. Proceedings of the 2023 IEEE Symposium on Computers and Communications (ISCC), Gammarth, Tunisia.","DOI":"10.1109\/ISCC58397.2023.10217933"},{"key":"ref_9","unstructured":"Istifan, S., and Makovac, M. (2022). Performance Benchmarking of Data-at-Rest Encryption in Relational Databases. [Bachelor\u2019s Thesis, University of Sk\u00f6vde]."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"7","DOI":"10.21928\/uhdjst.v8n2y2024.pp7-23","article-title":"Evaluating Aggregate Functions and Machine Learning Integration: A Comparative Analysis of Performance, Security, and NoSQL Connectivity in Oracle, SQL Server, and MySQL","volume":"8","author":"Hussein","year":"2024","journal-title":"UHD J. Sci. Technol."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"AbdAllah, E.G., Kuang, Y.R., and Huang, C. (2020, January 14\u201316). Advanced Encryption Standard New Instructions (Aes-Ni) Analysis: Security, Performance, and Power Consumption. Proceedings of the 2020 12th International Conference on Computer and Automation Engineering, Sydney, NSW, Australia.","DOI":"10.1145\/3384613.3384648"},{"key":"ref_12","unstructured":"Wessler Boneti, G. (2023). Identify Threat Model and Protection Offered by Different Encryption Possibilities in MySQL, PostgreSQL and Oracle, European Organization for Nuclear Research."},{"key":"ref_13","unstructured":"Dzer, R.M. (2016). Enhancing Query Performance and Privacy on Relational Cloud Database. [Master\u2019s Thesis, Ahmadu Bello University]."},{"key":"ref_14","unstructured":"Gubala Hari Babu, L.S., and Dodla, S.N.S. (2024). Comparative Analysis of Oracle and MySQL Databases: A Study on Query Execution and Scalability. [Bachelor\u2019s Thesis, Blekinge Institute of Technology, Department of Computer Science]."},{"key":"ref_15","unstructured":"Katsadouris, A.T. (2021). Advanced Cryptographic Techniques For Database Security. [Master\u2019s Thesis, National and Kapodistrian University of Athens]."},{"key":"ref_16","unstructured":"Ansmink, S. (2021). Encrypted Query Processing in DuckDB. [Master\u2019s Thesis, Vrije Universiteit Amsterdam]."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Sidorov, V., and Ng, W.K. (July, January 27). Transparent Data Encryption for Data-in-Use and Data-at-Rest in a Cloud-Based Database-as-a-Service Solution. Proceedings of the 2015 IEEE World Congress on Services, New York, NY, USA.","DOI":"10.1109\/SERVICES.2015.40"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Natarajan, K., and Shaik, V. (2020, January 26\u201327). Transparent Data Encryption: Comparative Analysis and Performance Evaluation of Oracle Databases. Proceedings of the 2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), Bangalore, India.","DOI":"10.1109\/ICRCICN50933.2020.9296168"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Hu, J., and Klein, A. (2009, January 12\u201314). A Benchmark of Transparent Data Encryption for Migration of Web Applications in the Cloud. Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, Chengdu, China.","DOI":"10.1109\/DASC.2009.85"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Mattsson, U.T. (2005). Database Encryption-How to Balance Security with Performance. SSRN Electron. J.","DOI":"10.2139\/ssrn.670561"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.cose.2014.03.011","article-title":"Implementing a Database Encryption Solution, Design and Implementation Issues","volume":"44","author":"Shmueli","year":"2014","journal-title":"Comput. Secur."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Colbert, P., and Juliano, B. (2009, January 13\u201316). A Performance Comparison of Microsoft SQL Server 2008 Transparent Data Encryption and NetLib Encryptionizer. Proceedings of the 2009 International Conference on Security & Managemen, SAM 2009, Las Vegas, NV, USA.","DOI":"10.1007\/978-1-4302-3365-7_6"},{"key":"ref_23","first-page":"17","article-title":"A New Comparative Study of Database Security","volume":"33","author":"Togan","year":"2023","journal-title":"Rom. J. Inf. Technol. Autom. Control."},{"key":"ref_24","unstructured":"Transaction Processing Performance Council TPC-H Benchmark (Decision Support) (2022). Standard Specification Revision 3.0.1., Transaction Processing Performance Council."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Moussa, R. (2012). TPC-H Benchmark Analytics Scenarios and Performances on Hadoop Data Clouds, Springer. Communications in Computer and Information Science.","DOI":"10.1007\/978-3-642-30507-8_20"},{"key":"ref_26","unstructured":"Thanopoulou, A., Carreira, P., and Galhardas, H. (July, January 28). Benchmarking with TPC-H on Off-the-Shelf Hardware: An Experiments Report. Proceedings of the 14th International Conference on Enterprise Information Systems (ICEIS\u20192012), Wroclaw, Poland."},{"key":"ref_27","unstructured":"(2025, September 30). DB-Engines Ranking-Popularity Ranking of Database Management Systems. Available online: https:\/\/db-engines.com\/en\/ranking."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Monteiro, J., S\u00e1, F., and Bernardino, J. (2023). Experimental Evaluation of Graph Databases: JanusGraph, Nebula Graph, Neo4j, and TigerGraph. Appl. Sci., 13.","DOI":"10.3390\/app13095770"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Pina, E., S\u00e1, F., and Bernardino, J. (2022). NewSQL Databases Assessment: CockroachDB, MariaDB Xpand, and VoltDB. Future Internet, 15.","DOI":"10.3390\/fi15010010"},{"key":"ref_30","unstructured":"(2025, September 30). MySQL Transparent Data Encryption (TDE) in MySQL Enterprise Edition. MySQL Enterprise Documentation; Oracle USA, Inc., Redwood City, CA, USA. Available online: https:\/\/www.mysql.com\/products\/enterprise\/tde.html."},{"key":"ref_31","unstructured":"(2025, September 30). Microsoft Transparent Data Encryption (TDE). Microsoft SQL Server Documentation 2024; Microsoft Corporation, Redmond, WA, USA. Available online: https:\/\/learn.microsoft.com\/en-us\/sql\/relational-databases\/security\/encryption\/transparent-data-encryption?view=sql-server-ver17."},{"key":"ref_32","unstructured":"Akhtar, A. (2023). Popularity Ranking of Database Management Systems. arXiv."},{"key":"ref_33","unstructured":"Pasarin, L., Advisor, P., Sarroca, E.M., and Arias, P.C. (2013). Analysis of Alternatives to Store Genealogical Trees Using Graph Databases. [Master\u2019s Thesis, Universitat Polit\u00e8cnica de Catalunya]."},{"key":"ref_34","unstructured":"(2025, September 30). Oracle Database Editions. Available online: https:\/\/docs.oracle.com\/cd\/E11882_01\/license.112\/e47877\/editions.htm#DBLIC134."},{"key":"ref_35","unstructured":"Yang, X. (2011). Analysis of DBMS: MySQL Vs PostgreSQL. [Bachelor\u2019s Thesis, Kemi-Tornio University of Applied Sciences]."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Janjua, J.I., Khan, T.A., Zulfiqar, S., and Usman, M.Q. (2022, January 22\u201324). An Architecture of MySQL Storage Engines to Increase the Resource Utilization. Proceedings of the 2022 International Balkan Conference on Communications and Networking (BalkanCom), Sarajevo, Bosnia and Herzegovina.","DOI":"10.1109\/BalkanCom55633.2022.9900616"},{"key":"ref_37","unstructured":"Ili\u0107, M., Kopanja, L., Zlatkovi\u0107, D., Trajkovi\u0107, M., and \u0106urguz, D. (2021, January 2\u20134). Microsoft Sql Server and Oracle: Comparative Performance Analysis. Proceedings of the 7th International conference Knowledge management and informatics, Vrnjacka Banja, Serbia."},{"key":"ref_38","first-page":"333","article-title":"A Survey on the Cryptographic Encryption Algorithms","volume":"8","author":"Mushtaq","year":"2017","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Buell, D. (2021). Modern Symmetric Ciphers\u2014Des and Aes. Fundamentals of Cryptography: Introducing Mathematical and Algorithmic Foundations, Springer.","DOI":"10.1007\/978-3-030-73492-3"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"215","DOI":"10.46586\/tosc.v2023.i4.215-243","article-title":"Related-Key Differential Analysis of the AES","volume":"2023","author":"Boura","year":"2023","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"ref_41","unstructured":"Oracle White Paper (2012). Oracle Advanced Security Transparent Data Encryption Best Practices, Oracle Corporation."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Coles Michael and Landrum, R. (2009). Transparent Data Encryption. Expert SQL Server 2008 Encryption, Apress.","DOI":"10.1007\/978-1-4302-3365-7"},{"key":"ref_43","unstructured":"(2025, September 30). MySQL: Announcing: MySQL Enterprise Transparent Data Encryption (TDE). Available online: https:\/\/forums.mysql.com\/read.php?3,644914."},{"key":"ref_44","unstructured":"(2025, April 29). Introduction to Transparent Data Encryption. Available online: https:\/\/docs.oracle.com\/en\/database\/oracle\/oracle-database\/21\/asoag\/introduction-to-transparent-data-encryption.html#GUID-688B2CA5-EB00-4BEE-9486-9046670CCA70."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/4\/77\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T19:13:20Z","timestamp":1764962000000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/4\/77"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,29]]},"references-count":44,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["cryptography9040077"],"URL":"https:\/\/doi.org\/10.3390\/cryptography9040077","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,29]]}}}