Skip to main content

A Secure Scheme of Key Management for Database Encryption

  • Conference paper
Advances in Technology and Management

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 165))

  • 1009 Accesses

Abstract

Key management is the crucial technique for database encryption. The keys to encryt and decrypt the secret data are generated and administered by the creators who create the secret data. Anyone who makes a request on the secret data has to register himself in a certificate authority and get his public key certificate. The requestor sends his request on the secret data to the database administrator and the creator of the secret data. The database administrator verifies the identity of the requestor and forwards the request to the creator. After the creator compares the two requests, he sends the keys to the requestor. The schmen is more safe because the keys is administered by different creators, the secret data saved in database is encrypted with the creator’s writing keys and the database administrator’s ephemeral keys, the creators’ reading and writing keys must be changed periodically and the administrator’s ephemeral must be changed after every writing operation.

This work was supported by the Foundation of Weinan Teachers University under grant a research on fair and effective electronic payment protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhao, Z., Liu, B., Li, J.: Research and design of database encryption system based on external DBMS. Computer Engineering and Design 29(12), 3030–3032 (2008)

    MathSciNet  Google Scholar 

  2. Yu, X., Cui, Y., Cui, G.: Key management for database encryption in distributed environment. J. Huangzhong Univ. of Sci. & Tech. (Natural Science Edition) 30(4), 43–45 (2002)

    Google Scholar 

  3. Xiu, M., Chen, C., Ying, J.: An interactive Zero-konwledge proof based protocol of identification and digital signature. Journal of Computer Research and Development 39(9), 1051–1056 (2002)

    Google Scholar 

  4. Feige, U., Fiat, A., Shamir, A.: Zero-knowledge proofs of identity. Journal of Cryptology 1(2), 77–94 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  5. Chen, T., Chen, H., Liuyu: Three-layer application system for database encryption. J. Huangzhong Univ. of Sci. & Tech (Natural Science Edition) 33(7), 41–44 (2005)

    Google Scholar 

  6. Zhu, J.: Database encryption scheme for enhanced security and easy sharing. Application Research of Computers 24(3), 128–131 (2007)

    Google Scholar 

  7. Wang, M., Dai, Z., Fang, Y.: New one-time passwords schemes and application. Application Research of Computers (1), 108–110 (2005)

    Google Scholar 

  8. Feng, C., Qin, Z., Yuanding: Design of key-management module of database encryption system. Journal of University of Electronic Science and Technology of China 36(5), 830–833 (2007)

    MathSciNet  Google Scholar 

  9. Feng, C., Yuanding: A key distribution scheme based on Chinese Remainder Theorem. Computer Engineering 32(14), 146–148 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiao-han Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this paper

Cite this paper

Sun, Xh. (2012). A Secure Scheme of Key Management for Database Encryption. In: Kim, H. (eds) Advances in Technology and Management. Advances in Intelligent and Soft Computing, vol 165. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29637-6_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29637-6_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29636-9

  • Online ISBN: 978-3-642-29637-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics