RSA Based Key Compromised Resistant P rotocol(KCR) For Large Databases

Data communication and networking are essential in our daily lives. Companies rely on computer networks and internetworks to exchange information that is normally stored in large databases, with their customers. Nonetheless, it is not guaranteed that all networks are reliable; therefore, database content should be protected against any unauthorized access. One of the most powerful strategies that has been used in existing database security systems to protect databases is database encryption. Few of these systems are practical to be used with large databases since one important issue is not satisfactorily addressed which is concerning key management. It may take days to encrypt the huge databases. Imagine how the situation will be when a key is compromised! Straightforward solutions to address this problem demand that the keys used in database encryption to be replaced with new keys. Consequently, a database re-encryption process has to be executed. In this thesis, we propose "RSA-based Key Compromised Resistant Protocol (KCR)" to effectively address this problem.

[1]  Gao Feng,et al.  A cryptography index technology and method to measure information disclosure in the DAS model , 2009 .

[2]  Bhavani M. Thuraisingham,et al.  Multilevel Security in Database Management Systems , 1987, Comput. Secur..

[3]  John B. Kam,et al.  A database encryption system with subkeys , 1981, TODS.

[4]  Dan Boneh,et al.  Experimenting with Shared Generation of RSA Keys , 1999, NDSS.

[5]  Wei-Pang Yang,et al.  Multilevel Secure Database Encryption with Subkeys , 1997, Data Knowl. Eng..

[6]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[7]  Harshavardhan Kayarkar Classification of Various Security Techniques in Databases and their Comparative Analysis , 2012, ArXiv.

[8]  Meg Murray,et al.  Database Security: What Students Need to Know , 2010, J. Inf. Technol. Educ. Innov. Pract..

[9]  J. Grossschadl,et al.  The Chinese Remainder Theorem and its application in a high-speed RSA crypto chip , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[10]  James Arlin Cooper Computer and communications security: strategies for the 1990s , 1989 .

[11]  Sushil Jajodia,et al.  Efficient Proxy-Based Internet Media Distribution Control and Privacy Protection Infrastructure , 2006, 200614th IEEE International Workshop on Quality of Service.

[12]  Peter J. Denning,et al.  Protection: principles and practice , 1972, AFIPS '72 (Spring).

[13]  Behrouz A. Forouzan,et al.  Data Communications and Networking , 2000 .