The key management method for the system of end-to-end symmetric database encryption
The article is devoted to the description of ways to manage cryptographic keys for the system of end-to-end symmetric database encryption designed to implement access control mechanisms with the aim of enhancing the capabilities for managing user rights. It describes how to use unique encryption key...
Gespeichert in:
Veröffentlicht in: | MATEC web of conferences 2018-01, Vol.226, p.5002 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The article is devoted to the description of ways to manage cryptographic keys for the system of end-to-end symmetric database encryption designed to implement access control mechanisms with the aim of enhancing the capabilities for managing user rights. It describes how to use unique encryption keys for individual database tables, the associated information security risks and approaches to their elimination using cryptography. Separately, the question of implementing the method of managing access to rows of the table by creating a multi-level hierarchy of users using encryption key chains formed through irreversible transformations, as well as the exchange of data by keys. It is proposed to implement it using a crypto container, which is a set of information necessary for the operation of asymmetric encryption algorithms and modified taking into account the peculiarities of the system in question, which allows providing comprehensive information security of user data. |
---|---|
ISSN: | 2261-236X 2274-7214 2261-236X |
DOI: | 10.1051/matecconf/201822605002 |