System of end-to-end symmetric database encryption

被引:0
|
作者
Galushka, V. V. [1 ]
Aydinyan, A. R. [1 ]
Tsvetkova, O. L. [1 ]
Fathi, V. A. [1 ]
Fathi, D. V. [1 ]
机构
[1] Don State Tech Univ, 1 Gagarina Sq, Rostov Na Donu 344000, Russia
关键词
D O I
10.1088/1742-6596/1015/4/042003
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The article is devoted to the actual problem of protecting databases from information leakage, which is performed while bypassing access control mechanisms. To solve this problem, it is proposed to use end-to-end data encryption, implemented at the end nodes of an interaction of the information system components using one of the symmetric cryptographic algorithms. For this purpose, a key management method designed for use in a multi-user system based on the distributed key representation model, part of which is stored in the database, and the other part is obtained by converting the user's password, has been developed and described. In this case, the key is calculated immediately before the cryptographic transformations and is not stored in the memory after the completion of these transformations. Algorithms for registering and authorizing a user, as well as changing his password, have been described, and the methods for calculating parts of a key when performing these operations have been provided.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] The Many Faces of End-to-End Encryption and Their Security Analysis
    Nabeel, Mohamed
    2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 252 - 259
  • [22] An Encryption Protocol for End-to-end Secure Transmission of SMS
    Thomas, Minta
    Panchami, V
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [23] Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network
    Inam, Saba
    Kanwal, Shamsa
    Anwar, Anousha
    Mirza, Noor Fatima
    Alfraihi, Hessa
    EGYPTIAN INFORMATICS JOURNAL, 2024, 28
  • [24] END-TO-END TRAINING OF A LARGE VOCABULARY END-TO-END SPEECH RECOGNITION SYSTEM
    Kim, Chanwoo
    Kim, Sungsoo
    Kim, Kwangyoun
    Kumar, Mehul
    Kim, Jiyeon
    Lee, Kyungmin
    Han, Changwoo
    Garg, Abhinav
    Kim, Eunhyang
    Shin, Minkyoo
    Singh, Shatrughan
    Heck, Larry
    Gowda, Dhananjaya
    2019 IEEE AUTOMATIC SPEECH RECOGNITION AND UNDERSTANDING WORKSHOP (ASRU 2019), 2019, : 562 - 569
  • [25] Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
    Isobe, Takanori
    Minematsu, Kazuhiko
    COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 249 - 268
  • [26] MemFHE: End-to-end Computing with Fully Homomorphic Encryption in Memory
    Gupta, Saransh
    Cammarota, Rosario
    Simunic, Tajana
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2024, 23 (02)
  • [27] End-to-End Encryption in Resource-Constrained IoT Device
    Alluhaidan, Ala Saleh D.
    Prabu, P.
    IEEE ACCESS, 2023, 11 : 70040 - 70051
  • [28] Securing SCADA Applications Using OpenPLC With End-To-End Encryption
    Alves, Thiago
    Morris, Thomas
    Yoo, Seong-Moo
    3RD ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2017), 2017, : 1 - 6
  • [29] End-to-end Encryption for SMS Messages in the Health Care Domain
    Hassinen, Marko
    Laitinen, Pertti
    CONNECTING MEDICAL INFORMATICS AND BIO-INFORMATICS, 2005, 116 : 316 - 321
  • [30] Towards Efficient End-to-End Encryption for Container Checkpointing Systems
    Stoyanov, Radostin
    Reber, Adrian
    Ueno, Daiki
    Clapinski, Michal
    Vagin, Andrei
    Bruno, Rodrigo
    PROCEEDINGS OF THE 15TH ACM SIGOPS ASIA-PACIFIC WORKSHOP ON SYSTEMS, APSYS 2024, 2024, : 60 - 66