首页> 外文期刊>Journal of Physics: Conference Series >System of end-to-end symmetric database encryption
【24h】

System of end-to-end symmetric database encryption

机译:端到端对称数据库加密系统

获取原文
           

摘要

The article is devoted to the actual problem of protecting databases from information leakage, which is performed while bypassing access control mechanisms. To solve this problem, it is proposed to use end-to-end data encryption, implemented at the end nodes of an interaction of the information system components using one of the symmetric cryptographic algorithms. For this purpose, a key management method designed for use in a multi-user system based on the distributed key representation model, part of which is stored in the database, and the other part is obtained by converting the user's password, has been developed and described. In this case, the key is calculated immediately before the cryptographic transformations and is not stored in the memory after the completion of these transformations. Algorithms for registering and authorizing a user, as well as changing his password, have been described, and the methods for calculating parts of a key when performing these operations have been provided.
机译:本文专门讨论保护数据库免受信息泄漏的实际问题,该问题是在绕过访问控制机制时执行的。为了解决该问题,提出了使用端对端数据加密,该端对端数据加密是在使用对称密码算法之一的信息系统组件的交互的端节点处实现的。为此,已经开发了一种基于分布式密钥表示模型设计用于多用户系统的密钥管理方法,该模型的一部分存储在数据库中,另一部分通过转换用户密码获得。描述。在这种情况下,密钥在密码转换之前立即计算,并且在这些转换完成之后不存储在存储器中。已经描述了用于注册和授权用户以及更改其密码的算法,并且提供了用于在执行这些操作时计算密钥的一部分的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号