Autor: |
Olga Leonidovna Tsvetkova, Vasily Galushka, Daniil Marshakov, Andrey Razmikovich Aydinyan, Denis Fathi |
Rok vydání: |
2018 |
Předmět: |
|
Zdroj: |
MATEC Web of Conferences, Vol 226, p 05002 (2018) |
ISSN: |
2261-236X |
DOI: |
10.1051/matecconf/201822605002 |
Popis: |
The article is devoted to the description of ways to manage cryptographic keys for the system of end-to-end symmetric database encryption designed to implement access control mechanisms with the aim of enhancing the capabilities for managing user rights. It describes how to use unique encryption keys for individual database tables, the associated information security risks and approaches to their elimination using cryptography. Separately, the question of implementing the method of managing access to rows of the table by creating a multi-level hierarchy of users using encryption key chains formed through irreversible transformations, as well as the exchange of data by keys. It is proposed to implement it using a crypto container, which is a set of information necessary for the operation of asymmetric encryption algorithms and modified taking into account the peculiarities of the system in question, which allows providing comprehensive information security of user data. |
Databáze: |
OpenAIRE |
Externí odkaz: |
|