System of end-to-end symmetric database encryption

被引:0
|
作者
Galushka, V. V. [1 ]
Aydinyan, A. R. [1 ]
Tsvetkova, O. L. [1 ]
Fathi, V. A. [1 ]
Fathi, D. V. [1 ]
机构
[1] Don State Tech Univ, 1 Gagarina Sq, Rostov Na Donu 344000, Russia
关键词
D O I
10.1088/1742-6596/1015/4/042003
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The article is devoted to the actual problem of protecting databases from information leakage, which is performed while bypassing access control mechanisms. To solve this problem, it is proposed to use end-to-end data encryption, implemented at the end nodes of an interaction of the information system components using one of the symmetric cryptographic algorithms. For this purpose, a key management method designed for use in a multi-user system based on the distributed key representation model, part of which is stored in the database, and the other part is obtained by converting the user's password, has been developed and described. In this case, the key is calculated immediately before the cryptographic transformations and is not stored in the memory after the completion of these transformations. Algorithms for registering and authorizing a user, as well as changing his password, have been described, and the methods for calculating parts of a key when performing these operations have been provided.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
    Hayati, Nur
    Suryanto, Yohan
    Ramli, Kalamullah
    Suryanegara, Muhammad
    PROCEEDINGS OF 2019 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND TECHNOLOGY (ICCET 2019), 2019, : 101 - 106
  • [42] Stick: An End-to-End Encryption Protocol Tailored for Social Network Platforms
    Basem, Omar
    Ullah, Abrar
    Hassen, Hani Ragab
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1258 - 1269
  • [43] NOVEL KEY MANAGEMENT FOR 3G END-TO-END ENCRYPTION
    Wang, Jian
    Jiang, Nan
    Li, Hui
    Niu, Xinxin
    Yang, Yixian
    2009 GLOBAL MOBILE CONGRESS, 2009, : 161 - +
  • [44] In Encryption We Don't Trust: The Effect of End-To-End Encryption to the Masses on User Perception
    Dechand, Sergej
    Naiakshina, Alena
    Danilova, Anastasia
    Smith, Matthew
    2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 401 - 415
  • [45] Using End-to-end Data Encryption to Secure SIP Device Configuration
    Chen, Xudong
    Fan, Wenjun
    2013 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC), 2013, : 58 - 63
  • [46] End-to-end Tangut character database building and recognition method
    Ma, Jinlin
    Cao, Yunrui
    Ma, Ziping
    Wei, Lin
    Hao, Chaohua
    IET IMAGE PROCESSING, 2022, 16 (08) : 2087 - 2100
  • [47] The end of end-to-end?
    Garfinkel, S
    TECHNOLOGY REVIEW, 2003, 106 (06) : 30 - 30
  • [48] End-to-end consensus using end-to-end channels
    Wiesmann, Matthias
    Defago, Xavier
    12TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2006, : 341 - +
  • [49] A Framework for End-to-End Ontology Management System
    Walisadeera, Anusha Indika
    Ginige, Athula
    Wikramanayake, Gihan Nilendra
    Madushanka, A. L. Pamuditha
    Udeshini, A. A. Shanika
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT I, 2015, 9155 : 529 - 544
  • [50] Proposal of an End-to-End Emergency Medical System
    El-Masri, Samir
    Saddik, Basema
    USER CENTRED NETWORKED HEALTH CARE, 2011, 169 : 349 - 353