2019
DOI: 10.3844/jcssp.2019.844.854
|View full text |Cite
|
Sign up to set email alerts
|

A New Database Encryption Model Based on Encryption Classes

Abstract: Data encryption is one of the advanced measures used to consolidate data security inside Databases. It is an essential technique to protect data against theft, disclosure or modification from different typologies of attacks. In this work, we will propose a new database encryption model. It is based on a novel concept called "Encryption Classes". The proposed model is full compared to the existing models; it integrates many security mechanisms starting from the keys generation and their protection until the dat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…A digital signature [8] (also known as a public key digital signature) is a digital string that can only be forged by the sender of the information. This digital string is also valid proof of the authenticity of the information sent to the sender of the information.…”
Section: Activation and Bindingmentioning
confidence: 99%
“…A digital signature [8] (also known as a public key digital signature) is a digital string that can only be forged by the sender of the information. This digital string is also valid proof of the authenticity of the information sent to the sender of the information.…”
Section: Activation and Bindingmentioning
confidence: 99%
“…Data encryption at the DBMS level is based fundamentally on its specific encryption model. The management of encryption keys within this model is a crucial point, it defines the ways how keys are generated, stored, and protected [9,10]. Actually, keys values, how users access them, and where they are stored are the ultimate goal of any attacker.…”
Section: Introductionmentioning
confidence: 99%
“…Notwithstanding several DB security studies for improving the concept of encryption keys protection within DBMS, more investigations are required to develop, improve, and provide more security and flexibility to keys protection. Then, as discussed in our previous work presented in [7,10,15], most of the proposed solutions have their advantages and disadvantages. However, to our knowledge, a trusted and simple solution concretized by a real implementation, and adapted to more than one DB encryption model has not yet been proposed.…”
Section: Introductionmentioning
confidence: 99%
“…Currently, a penetration to a DB using SQL injection techniques becomes fast and quite simple thanks to specialized tools [10]. Different threats may come from various sources, some from trusted DB users, others from external ones, and some attacks are performed by the DB administrators [1], [2], [3]. Data theft is a dangerous attack.…”
Section: Introductionmentioning
confidence: 99%
“…Despite the efforts made by researchers to improve the protection of encryption keys at the application level, they still need to be developed and improved. The solutions proposed in the literature are not sufficient as well as each solution has its limits, as we have mentioned in our previous works [3], [5], [8]. In addition, the solutions mostly presented are specific in the case when encryption is done at DBMS.…”
Section: Introductionmentioning
confidence: 99%