System of end-to-end symmetric database encryption

被引:0
|
作者
Galushka, V. V. [1 ]
Aydinyan, A. R. [1 ]
Tsvetkova, O. L. [1 ]
Fathi, V. A. [1 ]
Fathi, D. V. [1 ]
机构
[1] Don State Tech Univ, 1 Gagarina Sq, Rostov Na Donu 344000, Russia
关键词
D O I
10.1088/1742-6596/1015/4/042003
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The article is devoted to the actual problem of protecting databases from information leakage, which is performed while bypassing access control mechanisms. To solve this problem, it is proposed to use end-to-end data encryption, implemented at the end nodes of an interaction of the information system components using one of the symmetric cryptographic algorithms. For this purpose, a key management method designed for use in a multi-user system based on the distributed key representation model, part of which is stored in the database, and the other part is obtained by converting the user's password, has been developed and described. In this case, the key is calculated immediately before the cryptographic transformations and is not stored in the memory after the completion of these transformations. Algorithms for registering and authorizing a user, as well as changing his password, have been described, and the methods for calculating parts of a key when performing these operations have been provided.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
    Hayati, Nur
    Suryanto, Yohan
    Ramli, Kalamullah
    Suryanegara, Muhammad
    [J]. PROCEEDINGS OF 2019 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND TECHNOLOGY (ICCET 2019), 2019, : 101 - 106
  • [42] Design of Cryptographic model for End-to-End Encryption in FPGA based systems
    Chatterjee, Runa
    Chakraborty, Rajdeep
    Mandal, J. K.
    [J]. PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 459 - 465
  • [43] NOVEL KEY MANAGEMENT FOR 3G END-TO-END ENCRYPTION
    Wang, Jian
    Jiang, Nan
    Li, Hui
    Niu, Xinxin
    Yang, Yixian
    [J]. 2009 GLOBAL MOBILE CONGRESS, 2009, : 161 - +
  • [44] End-to-end Tangut character database building and recognition method
    Ma, Jinlin
    Cao, Yunrui
    Ma, Ziping
    Wei, Lin
    Hao, Chaohua
    [J]. IET IMAGE PROCESSING, 2022, 16 (08) : 2087 - 2100
  • [45] The end of end-to-end?
    Garfinkel, S
    [J]. TECHNOLOGY REVIEW, 2003, 106 (06) : 30 - 30
  • [46] End-to-end consensus using end-to-end channels
    Wiesmann, Matthias
    Defago, Xavier
    [J]. 12TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2006, : 341 - +
  • [47] End-to-end stereoscopic video streaming system
    Pehlivan, Selen
    Aksay, Anil
    Bilen, Cagdas
    Akar, Gozde Bozdagi
    Civanlar, M. Reha
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO - ICME 2006, VOLS 1-5, PROCEEDINGS, 2006, : 2169 - 2172
  • [48] END-TO-END HIERARCHICAL LANGUAGE IDENTIFICATION SYSTEM
    Irtza, Saad
    Sethu, Vidhyasaharan
    Ambikairajah, Eliathamby
    Li, Haizhou
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, : 5199 - 5203
  • [49] An End-to-End Communication System with Environmental Adaptability
    Zhao, Chengjie
    Wang, Jun
    Huang, Wei
    Chen, Xiaonan
    Peng, Qihang
    [J]. 2023 IEEE 98TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-FALL, 2023,
  • [50] End-to-end modeling of the solar terrestrial system
    Wiltberger, M.
    Baker, D.
    [J]. SPACE SCIENCE REVIEWS, 2006, 124 (1-4) : 217 - 231