New IV-Based database encryption scheme using TS block cipher

Current database security research classify four types of controls for the protection of data in databases: access controls, information flow controls, inference controls, and cryptographic controls. This paper covers the fourth type of controls, cryptographic controls in database security that p...

Full description

Bibliographic Details
Main Authors: Zailani Mohamad Sidek, Norbik Bashah Idris, Harihodin Selamat
Format: Article
Language:English
Published: Penerbit UKM 2004
Online Access:http://journalarticle.ukm.my/2177/
http://journalarticle.ukm.my/2177/
http://journalarticle.ukm.my/2177/1/vol1_abstract7.pdf
id ukm-2177
recordtype eprints
spelling ukm-21772016-12-14T06:30:55Z http://journalarticle.ukm.my/2177/ New IV-Based database encryption scheme using TS block cipher Zailani Mohamad Sidek, Norbik Bashah Idris, Harihodin Selamat, Current database security research classify four types of controls for the protection of data in databases: access controls, information flow controls, inference controls, and cryptographic controls. This paper covers the fourth type of controls, cryptographic controls in database security that provides security of data stored in commercial RDBMS like Oracle. The proposed database encryption scheme is based on TS Block and Stream Ciphers, and is capable of protecting data at the data element, row, and column levels using both block and stream encryptions. The design of the scheme’s key generation and management system allows the controls of users’ access to encrypted data in a multilevel fashion thus provide multilevel security. The scheme solves the problem of mandatory and discretionary access controls in a given organization. The security of the scheme is based on the fact that no cryptographic keys are stored in the database system. All encryption and decryption keys are stored securely in smartcards thus providing minimum cryptographic information to users. The design of the encryption scheme is based on the provably strong ciphers with 128-bit keys which is currently infeasible to be broken even by exhaustive key search. Implementation of the scheme has been conducted successfully in Oracle RDBMS and complements the Oracle encryption security available Penerbit UKM 2004 Article PeerReviewed application/pdf en http://journalarticle.ukm.my/2177/1/vol1_abstract7.pdf Zailani Mohamad Sidek, and Norbik Bashah Idris, and Harihodin Selamat, (2004) New IV-Based database encryption scheme using TS block cipher. Jurnal Teknologi Maklumat dan Multimedia, 1 . pp. 73-89. ISSN 1823-0113 http://www.ftsm.ukm.my/ejms/abstracts/vol1_abstract7.pdf
repository_type Digital Repository
institution_category Local University
institution Universiti Kebangasaan Malaysia
building UKM Institutional Repository
collection Online Access
language English
description Current database security research classify four types of controls for the protection of data in databases: access controls, information flow controls, inference controls, and cryptographic controls. This paper covers the fourth type of controls, cryptographic controls in database security that provides security of data stored in commercial RDBMS like Oracle. The proposed database encryption scheme is based on TS Block and Stream Ciphers, and is capable of protecting data at the data element, row, and column levels using both block and stream encryptions. The design of the scheme’s key generation and management system allows the controls of users’ access to encrypted data in a multilevel fashion thus provide multilevel security. The scheme solves the problem of mandatory and discretionary access controls in a given organization. The security of the scheme is based on the fact that no cryptographic keys are stored in the database system. All encryption and decryption keys are stored securely in smartcards thus providing minimum cryptographic information to users. The design of the encryption scheme is based on the provably strong ciphers with 128-bit keys which is currently infeasible to be broken even by exhaustive key search. Implementation of the scheme has been conducted successfully in Oracle RDBMS and complements the Oracle encryption security available
format Article
author Zailani Mohamad Sidek,
Norbik Bashah Idris,
Harihodin Selamat,
spellingShingle Zailani Mohamad Sidek,
Norbik Bashah Idris,
Harihodin Selamat,
New IV-Based database encryption scheme using TS block cipher
author_facet Zailani Mohamad Sidek,
Norbik Bashah Idris,
Harihodin Selamat,
author_sort Zailani Mohamad Sidek,
title New IV-Based database encryption scheme using TS block cipher
title_short New IV-Based database encryption scheme using TS block cipher
title_full New IV-Based database encryption scheme using TS block cipher
title_fullStr New IV-Based database encryption scheme using TS block cipher
title_full_unstemmed New IV-Based database encryption scheme using TS block cipher
title_sort new iv-based database encryption scheme using ts block cipher
publisher Penerbit UKM
publishDate 2004
url http://journalarticle.ukm.my/2177/
http://journalarticle.ukm.my/2177/
http://journalarticle.ukm.my/2177/1/vol1_abstract7.pdf
first_indexed 2023-09-18T19:35:24Z
last_indexed 2023-09-18T19:35:24Z
_version_ 1777405236976025600