System of end-to-end symmetric database encryption

被引:0
|
作者
Galushka, V. V. [1 ]
Aydinyan, A. R. [1 ]
Tsvetkova, O. L. [1 ]
Fathi, V. A. [1 ]
Fathi, D. V. [1 ]
机构
[1] Don State Tech Univ, 1 Gagarina Sq, Rostov Na Donu 344000, Russia
关键词
D O I
10.1088/1742-6596/1015/4/042003
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The article is devoted to the actual problem of protecting databases from information leakage, which is performed while bypassing access control mechanisms. To solve this problem, it is proposed to use end-to-end data encryption, implemented at the end nodes of an interaction of the information system components using one of the symmetric cryptographic algorithms. For this purpose, a key management method designed for use in a multi-user system based on the distributed key representation model, part of which is stored in the database, and the other part is obtained by converting the user's password, has been developed and described. In this case, the key is calculated immediately before the cryptographic transformations and is not stored in the memory after the completion of these transformations. Algorithms for registering and authorizing a user, as well as changing his password, have been described, and the methods for calculating parts of a key when performing these operations have been provided.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] DCGAN-based symmetric encryption end-to-end communication systems
    An, Yongli
    Wang, Mengtao
    Chen, Lei
    Ji, Zhanlin
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2022, 154
  • [2] End-to-End Plankton Database Collection System
    Yang, Xuewen
    Wang, Nan
    Cui, Yanni
    [J]. IEEE JOURNAL OF OCEANIC ENGINEERING, 2022, 47 (04) : 995 - 1009
  • [3] Novel end-to-end voice encryption method in GSM system
    Qi, H. F.
    Yang, X. H.
    Jiang, R.
    Liang, B.
    Zhou, S. J.
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 217 - 220
  • [4] Research on end-to-end encryption of TETRA
    Beijing FORICH Software Technology Co. Ltd., Network Security Division, Beijing 100083, China
    不详
    [J]. J. China Univ. Post Telecom., 2006, 2 (70-73):
  • [5] Research on End-to-End Encryption of TETRA
    ZHANG Zhi-hui 1
    2.Information Security Center
    [J]. The Journal of China Universities of Posts and Telecommunications, 2006, (02) : 70 - 73
  • [6] SDNS ARCHITECTURE AND END-TO-END ENCRYPTION
    NELSON, R
    HEIMANN, J
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 356 - 366
  • [7] A European right to end-to-end encryption?
    Shurson, Jessica
    [J]. Computer Law and Security Review, 2024, 55
  • [8] Anonymous Traceback for End-to-End Encryption
    Kenney, Erin
    Tang, Qiang
    Wu, Chase
    [J]. COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 42 - 62
  • [9] Subverting Telegram's End-to-End Encryption
    Cogliati, Benoit
    Ethan, Jordan
    Jha, Ashwin
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (01) : 5 - 40
  • [10] On Track of Sigfox Confidentiality with End-to-End Encryption
    Fujdiak, Radek
    Blazek, Petr
    Mikhaylov, Konstantin
    Malina, Lukas
    Mlynek, Petr
    Misurec, Jiri
    Blazek, Vojtech
    [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,