The Experts below are selected from a list of 9 Experts worldwide ranked by ideXlab platform
Gao Shang - One of the best experts on this subject based on the ideXlab platform.
-
Technology About Double Encryption Key of Database Security Based on AES Encryption Algorithm
Computer Systems and Applications, 2013Co-Authors: Gao ShangAbstract:To ensure the security of the generation and storage of Encryption Key,this system proposes one new double Encryption-Key mechanism for Database Encryption,in which the AES Encryption is used to get work Key from transform of the main Key,without setting work Key firstly.In order to further ensure the security of Database Encryption Key and to improve the Encryption Key generation rate,the construction of AES algorithm Key matrix is analyzed and improved.The Key expansion algorithm called ‘one-way’ design strategy is introduced to reduce the correlation between each wheel Key,which will help to provide a more effective guarantee for the security of Database.
Huang Zheng - One of the best experts on this subject based on the ideXlab platform.
-
Design of Security Key Management Scheme Based on Encryption Role in Database
Computer Systems and Applications, 2011Co-Authors: Huang ZhengAbstract:Designing an effective safe management scheme to resolve the Database Encryption Key for the allocation and management issues.By analyzing various Key management mechanism,a Key management scheme based on Encryption role is designed.Security of Key management scheme based on Encryption role was analyzed,Key management scheme based on Encryption role was actualizd in Database.Key management scheme based on Encryption role greatly facilitated access jurisdiction management and greatly improved the Key management efficiency.
Costas Lambrinoudakis - One of the best experts on this subject based on the ideXlab platform.
-
ISSPIT - Towards an augmented authenticator in the Cloud
2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2014Co-Authors: Nikolaos Pitropakis, Nikolaos Yfantopoulos, Dimitris Geneiatakis, Costas LambrinoudakisAbstract:Many times in the past, critical infrastructures like e-health and e-government services have become a target of cyber-attacks resulting to manipulation of sensitive information. Meanwhile, there are several approaches applying security and privacy protection measures on cloud-based Databases. Simultaneously, many steganographic algorithms have been proposed for achieving security on Cloud Infrastructures. This paper proposes a practical method for applying steganography in an one-time authenticator tool for Cloud-based Databases in a healthcare scenario. The proposed method takes into account the architecture of the Database server in the cloud and employs an authenticator tool that encrypts the Database Encryption Key and embeds it into the stego-cover. We have tested our approach on a cloud-based Database in order to evaluate the overhead introduced and facilitate a threat scenario for testing the security level. Results have revealed that the use of various text and WAV files did not introduce significant overhead. Depending on the file size the introduced delay was between 1 to 3 seconds.
Nikolaos Pitropakis - One of the best experts on this subject based on the ideXlab platform.
-
ISSPIT - Towards an augmented authenticator in the Cloud
2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2014Co-Authors: Nikolaos Pitropakis, Nikolaos Yfantopoulos, Dimitris Geneiatakis, Costas LambrinoudakisAbstract:Many times in the past, critical infrastructures like e-health and e-government services have become a target of cyber-attacks resulting to manipulation of sensitive information. Meanwhile, there are several approaches applying security and privacy protection measures on cloud-based Databases. Simultaneously, many steganographic algorithms have been proposed for achieving security on Cloud Infrastructures. This paper proposes a practical method for applying steganography in an one-time authenticator tool for Cloud-based Databases in a healthcare scenario. The proposed method takes into account the architecture of the Database server in the cloud and employs an authenticator tool that encrypts the Database Encryption Key and embeds it into the stego-cover. We have tested our approach on a cloud-based Database in order to evaluate the overhead introduced and facilitate a threat scenario for testing the security level. Results have revealed that the use of various text and WAV files did not introduce significant overhead. Depending on the file size the introduced delay was between 1 to 3 seconds.
Nikolaos Yfantopoulos - One of the best experts on this subject based on the ideXlab platform.
-
ISSPIT - Towards an augmented authenticator in the Cloud
2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2014Co-Authors: Nikolaos Pitropakis, Nikolaos Yfantopoulos, Dimitris Geneiatakis, Costas LambrinoudakisAbstract:Many times in the past, critical infrastructures like e-health and e-government services have become a target of cyber-attacks resulting to manipulation of sensitive information. Meanwhile, there are several approaches applying security and privacy protection measures on cloud-based Databases. Simultaneously, many steganographic algorithms have been proposed for achieving security on Cloud Infrastructures. This paper proposes a practical method for applying steganography in an one-time authenticator tool for Cloud-based Databases in a healthcare scenario. The proposed method takes into account the architecture of the Database server in the cloud and employs an authenticator tool that encrypts the Database Encryption Key and embeds it into the stego-cover. We have tested our approach on a cloud-based Database in order to evaluate the overhead introduced and facilitate a threat scenario for testing the security level. Results have revealed that the use of various text and WAV files did not introduce significant overhead. Depending on the file size the introduced delay was between 1 to 3 seconds.