Multilevel Secure Database Encryption with Subkeys
نویسندگان
چکیده
In this paper, we propose a multilevel database encryption system with subkeys. This new system is called the record-oriented cryptosystem which encrypts each record with different field-subkeys according to a security class of the data element. Each field is decrypted individually by the field-subkeys of which security class is higher than or equal to that of the encrypted field-subkeys. This system is based on the Chinese Remainder Theorem. Our scheme can protect the finest level of granularity such as relation level, attribute level, tuple level, or data element level in the relational database model.
منابع مشابه
A New Technique for Sub-Key Generation in Block Ciphers
In symmetric cryptosystems a primary key is used to create a number of subkeys according to specified key scheduling algorithm; the design of a good key schedule is a crucial aspect of cipher design. In this paper we describe a new technique to generate pseudorandom subkeys to be used in cryptographic algorithm suitable for hardware or software implementations; a simple and secure method for su...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملAn efficient VLSI implementation of IDEA encryption algorithm using VHDL
Data security is an important issue in computer networks and cryptographic algorithms are essential parts in network security. So far, International Data Encryption Algorithm (IDEA) is very secure. In this paper, we present a VLSI implementation of the IDEA block cipher using VHDL using AMI 0.5 process technology standard cells. We have optimized the modulus multiplier and exploited the tempora...
متن کاملA two-phase encryption scheme for enhancing database security
In this article, we propose a two-phase encryption algorithm for data base systems. The system, a record-oriented cryptosystem, allows the encryption and decryption of fields within a record by means of writing and reading subkeys of fields. In addition, we develop two algorithms for cryptographic relational algebra in data base systems. Two simple methods of solving the key management problem ...
متن کاملMultilevel security issues in distributed database management systems
T he advent of computers earlier this century has led us not only to rely increasingly on the information stored in them but also to trust their output. This alliance with the computer has resulted in the automation of basic operations and management support functions. This was done through the manipulation of computerized information maintained in a database. Although the creation and manipula...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Data Knowl. Eng.
دوره 22 شماره
صفحات -
تاریخ انتشار 1997