System of end-to-end symmetric database encryption

被引:0
|
作者
Galushka, V. V. [1 ]
Aydinyan, A. R. [1 ]
Tsvetkova, O. L. [1 ]
Fathi, V. A. [1 ]
Fathi, D. V. [1 ]
机构
[1] Don State Tech Univ, 1 Gagarina Sq, Rostov Na Donu 344000, Russia
关键词
D O I
10.1088/1742-6596/1015/4/042003
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The article is devoted to the actual problem of protecting databases from information leakage, which is performed while bypassing access control mechanisms. To solve this problem, it is proposed to use end-to-end data encryption, implemented at the end nodes of an interaction of the information system components using one of the symmetric cryptographic algorithms. For this purpose, a key management method designed for use in a multi-user system based on the distributed key representation model, part of which is stored in the database, and the other part is obtained by converting the user's password, has been developed and described. In this case, the key is calculated immediately before the cryptographic transformations and is not stored in the memory after the completion of these transformations. Algorithms for registering and authorizing a user, as well as changing his password, have been described, and the methods for calculating parts of a key when performing these operations have been provided.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Integrating end-to-end encryption and authentication technology into broadband networks
    Pierson, LG
    INTEGRATION ISSUES IN LARGE COMMERCIAL MEDIA DELIVERY SYSTEMS, 1996, 2615 : 260 - 269
  • [32] Usability of End-to-End Encryption in E-Mail Communication
    Reuter, Adrian
    Abdelmaksoud, Ahmed
    Boudaoud, Karima
    Winckler, Marco
    FRONTIERS IN BIG DATA, 2021, 4
  • [33] Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE
    Isobe, Takanori
    Minematsu, Kazuhiko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 313 - 324
  • [34] Scalable, Practical VoIP Teleconferencing With End-to-End Homomorphic Encryption
    Rohloff, Kurt
    Cousins, David Bruce
    Sumorok, Daniel
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) : 1031 - 1041
  • [35] Encipher GAN: An End-to-End Color Image Encryption System Using a Deep Generative Model
    Panwar, Kirtee
    Singh, Akansha
    Kukreja, Sonal
    Singh, Krishna Kant
    Shakhovska, Nataliya
    Boichuk, Andrii
    SYSTEMS, 2023, 11 (01):
  • [36] An End-to-End Automatic Cloud Database Tuning System Using Deep Reinforcement Learning
    Zhang, Ji
    Liu, Yu
    Zhou, Ke
    Li, Guoliang
    Xiao, Zhili
    Cheng, Bin
    Xing, Jiashu
    Wang, Yangtao
    Cheng, Tianheng
    Liu, Li
    Ran, Minwei
    Li, Zekang
    SIGMOD '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2019, : 415 - 432
  • [37] End-to-end system modeling of the VLT
    Manil, E
    Lieber, M
    OPTICAL TELESCOPES OF TODAY AND TOMORROW: FOLLOWING IN THE DIRECTION OF TYCHO BRAHE, 1997, 2871 : 181 - 192
  • [38] An approach to end-to-end system simulation
    Huynh, TV
    Titrud, HG
    1997 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOL 4, 1997, : 447 - 461
  • [39] Blockchain-enabled End-to-End Encryption for Instant Messaging Applications
    Singh, Raman
    Chauhan, Ark Nandan Singh
    Tewari, Hitesh
    2022 IEEE 23RD INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM 2022), 2022, : 501 - 506
  • [40] Design of Cryptographic model for End-to-End Encryption in FPGA based systems
    Chatterjee, Runa
    Chakraborty, Rajdeep
    Mandal, J. K.
    PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 459 - 465