Abstract
Key management is the crucial technique for database encryption. The keys to encryt and decrypt the secret data are generated and administered by the creators who create the secret data. Anyone who makes a request on the secret data has to register himself in a certificate authority and get his public key certificate. The requestor sends his request on the secret data to the database administrator and the creator of the secret data. The database administrator verifies the identity of the requestor and forwards the request to the creator. After the creator compares the two requests, he sends the keys to the requestor. The schmen is more safe because the keys is administered by different creators, the secret data saved in database is encrypted with the creator’s writing keys and the database administrator’s ephemeral keys, the creators’ reading and writing keys must be changed periodically and the administrator’s ephemeral must be changed after every writing operation.
This work was supported by the Foundation of Weinan Teachers University under grant a research on fair and effective electronic payment protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zhao, Z., Liu, B., Li, J.: Research and design of database encryption system based on external DBMS. Computer Engineering and Design 29(12), 3030–3032 (2008)
Yu, X., Cui, Y., Cui, G.: Key management for database encryption in distributed environment. J. Huangzhong Univ. of Sci. & Tech. (Natural Science Edition) 30(4), 43–45 (2002)
Xiu, M., Chen, C., Ying, J.: An interactive Zero-konwledge proof based protocol of identification and digital signature. Journal of Computer Research and Development 39(9), 1051–1056 (2002)
Feige, U., Fiat, A., Shamir, A.: Zero-knowledge proofs of identity. Journal of Cryptology 1(2), 77–94 (1988)
Chen, T., Chen, H., Liuyu: Three-layer application system for database encryption. J. Huangzhong Univ. of Sci. & Tech (Natural Science Edition) 33(7), 41–44 (2005)
Zhu, J.: Database encryption scheme for enhanced security and easy sharing. Application Research of Computers 24(3), 128–131 (2007)
Wang, M., Dai, Z., Fang, Y.: New one-time passwords schemes and application. Application Research of Computers (1), 108–110 (2005)
Feng, C., Qin, Z., Yuanding: Design of key-management module of database encryption system. Journal of University of Electronic Science and Technology of China 36(5), 830–833 (2007)
Feng, C., Yuanding: A key distribution scheme based on Chinese Remainder Theorem. Computer Engineering 32(14), 146–148 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag GmbH Berlin Heidelberg
About this paper
Cite this paper
Sun, Xh. (2012). A Secure Scheme of Key Management for Database Encryption. In: Kim, H. (eds) Advances in Technology and Management. Advances in Intelligent and Soft Computing, vol 165. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29637-6_40
Download citation
DOI: https://doi.org/10.1007/978-3-642-29637-6_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29636-9
Online ISBN: 978-3-642-29637-6
eBook Packages: EngineeringEngineering (R0)