Database Encryption Key

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 9 Experts worldwide ranked by ideXlab platform

Gao Shang - One of the best experts on this subject based on the ideXlab platform.

  • Technology About Double Encryption Key of Database Security Based on AES Encryption Algorithm
    Computer Systems and Applications, 2013
    Co-Authors: Gao Shang
    Abstract:

    To ensure the security of the generation and storage of Encryption Key,this system proposes one new double Encryption-Key mechanism for Database Encryption,in which the AES Encryption is used to get work Key from transform of the main Key,without setting work Key firstly.In order to further ensure the security of Database Encryption Key and to improve the Encryption Key generation rate,the construction of AES algorithm Key matrix is analyzed and improved.The Key expansion algorithm called ‘one-way’ design strategy is introduced to reduce the correlation between each wheel Key,which will help to provide a more effective guarantee for the security of Database.

Huang Zheng - One of the best experts on this subject based on the ideXlab platform.

  • Design of Security Key Management Scheme Based on Encryption Role in Database
    Computer Systems and Applications, 2011
    Co-Authors: Huang Zheng
    Abstract:

    Designing an effective safe management scheme to resolve the Database Encryption Key for the allocation and management issues.By analyzing various Key management mechanism,a Key management scheme based on Encryption role is designed.Security of Key management scheme based on Encryption role was analyzed,Key management scheme based on Encryption role was actualizd in Database.Key management scheme based on Encryption role greatly facilitated access jurisdiction management and greatly improved the Key management efficiency.

Costas Lambrinoudakis - One of the best experts on this subject based on the ideXlab platform.

  • ISSPIT - Towards an augmented authenticator in the Cloud
    2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2014
    Co-Authors: Nikolaos Pitropakis, Nikolaos Yfantopoulos, Dimitris Geneiatakis, Costas Lambrinoudakis
    Abstract:

    Many times in the past, critical infrastructures like e-health and e-government services have become a target of cyber-attacks resulting to manipulation of sensitive information. Meanwhile, there are several approaches applying security and privacy protection measures on cloud-based Databases. Simultaneously, many steganographic algorithms have been proposed for achieving security on Cloud Infrastructures. This paper proposes a practical method for applying steganography in an one-time authenticator tool for Cloud-based Databases in a healthcare scenario. The proposed method takes into account the architecture of the Database server in the cloud and employs an authenticator tool that encrypts the Database Encryption Key and embeds it into the stego-cover. We have tested our approach on a cloud-based Database in order to evaluate the overhead introduced and facilitate a threat scenario for testing the security level. Results have revealed that the use of various text and WAV files did not introduce significant overhead. Depending on the file size the introduced delay was between 1 to 3 seconds.

Nikolaos Pitropakis - One of the best experts on this subject based on the ideXlab platform.

  • ISSPIT - Towards an augmented authenticator in the Cloud
    2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2014
    Co-Authors: Nikolaos Pitropakis, Nikolaos Yfantopoulos, Dimitris Geneiatakis, Costas Lambrinoudakis
    Abstract:

    Many times in the past, critical infrastructures like e-health and e-government services have become a target of cyber-attacks resulting to manipulation of sensitive information. Meanwhile, there are several approaches applying security and privacy protection measures on cloud-based Databases. Simultaneously, many steganographic algorithms have been proposed for achieving security on Cloud Infrastructures. This paper proposes a practical method for applying steganography in an one-time authenticator tool for Cloud-based Databases in a healthcare scenario. The proposed method takes into account the architecture of the Database server in the cloud and employs an authenticator tool that encrypts the Database Encryption Key and embeds it into the stego-cover. We have tested our approach on a cloud-based Database in order to evaluate the overhead introduced and facilitate a threat scenario for testing the security level. Results have revealed that the use of various text and WAV files did not introduce significant overhead. Depending on the file size the introduced delay was between 1 to 3 seconds.

Nikolaos Yfantopoulos - One of the best experts on this subject based on the ideXlab platform.

  • ISSPIT - Towards an augmented authenticator in the Cloud
    2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2014
    Co-Authors: Nikolaos Pitropakis, Nikolaos Yfantopoulos, Dimitris Geneiatakis, Costas Lambrinoudakis
    Abstract:

    Many times in the past, critical infrastructures like e-health and e-government services have become a target of cyber-attacks resulting to manipulation of sensitive information. Meanwhile, there are several approaches applying security and privacy protection measures on cloud-based Databases. Simultaneously, many steganographic algorithms have been proposed for achieving security on Cloud Infrastructures. This paper proposes a practical method for applying steganography in an one-time authenticator tool for Cloud-based Databases in a healthcare scenario. The proposed method takes into account the architecture of the Database server in the cloud and employs an authenticator tool that encrypts the Database Encryption Key and embeds it into the stego-cover. We have tested our approach on a cloud-based Database in order to evaluate the overhead introduced and facilitate a threat scenario for testing the security level. Results have revealed that the use of various text and WAV files did not introduce significant overhead. Depending on the file size the introduced delay was between 1 to 3 seconds.