The key management method for the system of end-to-end symmetric database encryption

The article is devoted to the description of ways to manage cryptographic keys for the system of end-to-end symmetric database encryption designed to implement access control mechanisms with the aim of enhancing the capabilities for managing user rights. It describes how to use unique encryption key...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:MATEC web of conferences 2018-01, Vol.226, p.5002
Hauptverfasser: Galushka, Vasily, Marshakov, Daniil, Aydinyan, Andrey, Tsvetkova, Olga, Fathi, Denis
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The article is devoted to the description of ways to manage cryptographic keys for the system of end-to-end symmetric database encryption designed to implement access control mechanisms with the aim of enhancing the capabilities for managing user rights. It describes how to use unique encryption keys for individual database tables, the associated information security risks and approaches to their elimination using cryptography. Separately, the question of implementing the method of managing access to rows of the table by creating a multi-level hierarchy of users using encryption key chains formed through irreversible transformations, as well as the exchange of data by keys. It is proposed to implement it using a crypto container, which is a set of information necessary for the operation of asymmetric encryption algorithms and modified taking into account the peculiarities of the system in question, which allows providing comprehensive information security of user data.
ISSN:2261-236X
2274-7214
2261-236X
DOI:10.1051/matecconf/201822605002