New IV-Based database encryption scheme using TS block cipher
Current database security research classify four types of controls for the protection of data in databases: access controls, information flow controls, inference controls, and cryptographic controls. This paper covers the fourth type of controls, cryptographic controls in database security that p...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Penerbit UKM
2004
|
Online Access: | http://journalarticle.ukm.my/2177/ http://journalarticle.ukm.my/2177/ http://journalarticle.ukm.my/2177/1/vol1_abstract7.pdf |
id |
ukm-2177 |
---|---|
recordtype |
eprints |
spelling |
ukm-21772016-12-14T06:30:55Z http://journalarticle.ukm.my/2177/ New IV-Based database encryption scheme using TS block cipher Zailani Mohamad Sidek, Norbik Bashah Idris, Harihodin Selamat, Current database security research classify four types of controls for the protection of data in databases: access controls, information flow controls, inference controls, and cryptographic controls. This paper covers the fourth type of controls, cryptographic controls in database security that provides security of data stored in commercial RDBMS like Oracle. The proposed database encryption scheme is based on TS Block and Stream Ciphers, and is capable of protecting data at the data element, row, and column levels using both block and stream encryptions. The design of the scheme’s key generation and management system allows the controls of users’ access to encrypted data in a multilevel fashion thus provide multilevel security. The scheme solves the problem of mandatory and discretionary access controls in a given organization. The security of the scheme is based on the fact that no cryptographic keys are stored in the database system. All encryption and decryption keys are stored securely in smartcards thus providing minimum cryptographic information to users. The design of the encryption scheme is based on the provably strong ciphers with 128-bit keys which is currently infeasible to be broken even by exhaustive key search. Implementation of the scheme has been conducted successfully in Oracle RDBMS and complements the Oracle encryption security available Penerbit UKM 2004 Article PeerReviewed application/pdf en http://journalarticle.ukm.my/2177/1/vol1_abstract7.pdf Zailani Mohamad Sidek, and Norbik Bashah Idris, and Harihodin Selamat, (2004) New IV-Based database encryption scheme using TS block cipher. Jurnal Teknologi Maklumat dan Multimedia, 1 . pp. 73-89. ISSN 1823-0113 http://www.ftsm.ukm.my/ejms/abstracts/vol1_abstract7.pdf |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
Universiti Kebangasaan Malaysia |
building |
UKM Institutional Repository |
collection |
Online Access |
language |
English |
description |
Current database security research classify four types of controls for the protection of
data in databases: access controls, information flow controls, inference controls, and
cryptographic controls. This paper covers the fourth type of controls, cryptographic
controls in database security that provides security of data stored in commercial RDBMS
like Oracle. The proposed database encryption scheme is based on TS Block and Stream
Ciphers, and is capable of protecting data at the data element, row, and column levels
using both block and stream encryptions. The design of the scheme’s key generation and
management system allows the controls of users’ access to encrypted data in a multilevel
fashion thus provide multilevel security. The scheme solves the problem of mandatory
and discretionary access controls in a given organization. The security of the scheme is
based on the fact that no cryptographic keys are stored in the database system. All
encryption and decryption keys are stored securely in smartcards thus providing
minimum cryptographic information to users. The design of the encryption scheme is
based on the provably strong ciphers with 128-bit keys which is currently infeasible to be
broken even by exhaustive key search. Implementation of the scheme has been conducted
successfully in Oracle RDBMS and complements the Oracle encryption security available |
format |
Article |
author |
Zailani Mohamad Sidek, Norbik Bashah Idris, Harihodin Selamat, |
spellingShingle |
Zailani Mohamad Sidek, Norbik Bashah Idris, Harihodin Selamat, New IV-Based database encryption scheme using TS block cipher |
author_facet |
Zailani Mohamad Sidek, Norbik Bashah Idris, Harihodin Selamat, |
author_sort |
Zailani Mohamad Sidek, |
title |
New IV-Based database encryption scheme
using TS block cipher |
title_short |
New IV-Based database encryption scheme
using TS block cipher |
title_full |
New IV-Based database encryption scheme
using TS block cipher |
title_fullStr |
New IV-Based database encryption scheme
using TS block cipher |
title_full_unstemmed |
New IV-Based database encryption scheme
using TS block cipher |
title_sort |
new iv-based database encryption scheme
using ts block cipher |
publisher |
Penerbit UKM |
publishDate |
2004 |
url |
http://journalarticle.ukm.my/2177/ http://journalarticle.ukm.my/2177/ http://journalarticle.ukm.my/2177/1/vol1_abstract7.pdf |
first_indexed |
2023-09-18T19:35:24Z |
last_indexed |
2023-09-18T19:35:24Z |
_version_ |
1777405236976025600 |