Information and data protection within a RDBMS

Security issues for some special large data, such as binary and image files, as well as video and audio files and streams still require a special development, especially for the industrial database systems (Oracle, MS SQL, DB2, etc). New encryption methods should be used additionally to traditional...

Full description

Bibliographic Details
Main Author: Y. Khmelevsky
Format: Article
Language:English
Published: Institute for Condensed Matter Physics 2008-12-01
Series:Condensed Matter Physics
Subjects:
Online Access:http://dx.doi.org/10.5488/CMP.11.4.761
_version_ 1818329052023357440
author Y. Khmelevsky
author_facet Y. Khmelevsky
author_sort Y. Khmelevsky
collection DOAJ
description Security issues for some special large data, such as binary and image files, as well as video and audio files and streams still require a special development, especially for the industrial database systems (Oracle, MS SQL, DB2, etc). New encryption methods should be used additionally to traditional encryption methods and other protection solutions, such as authentication, authorization, access control, security monitoring and audit. The purpose of this article is to present the research results regarding information security and data protection, as well as some practical aspects of the encryption by CrypTIM algorithm, developed by Prof. V. Ustimenko in the last decade [Ustimenko V., Lecture Notes In Computer Science, 2001, 278, 2227]. This text additionally proposes a practical utilization of the Model Driven system design for large objects (LOB) encryptions within a database, used to store some special large binary files, such as images, sound files, movies, special binary files in order to improve maintenance and data protection. Novel problems and trends in providing security against criminal activities in the current Cyberspace are analyzed.
first_indexed 2024-12-13T12:41:55Z
format Article
id doaj.art-ecf227f8362b449594979274d8255446
institution Directory Open Access Journal
issn 1607-324X
language English
last_indexed 2024-12-13T12:41:55Z
publishDate 2008-12-01
publisher Institute for Condensed Matter Physics
record_format Article
series Condensed Matter Physics
spelling doaj.art-ecf227f8362b449594979274d82554462022-12-21T23:45:37ZengInstitute for Condensed Matter PhysicsCondensed Matter Physics1607-324X2008-12-01114761Information and data protection within a RDBMSY. KhmelevskySecurity issues for some special large data, such as binary and image files, as well as video and audio files and streams still require a special development, especially for the industrial database systems (Oracle, MS SQL, DB2, etc). New encryption methods should be used additionally to traditional encryption methods and other protection solutions, such as authentication, authorization, access control, security monitoring and audit. The purpose of this article is to present the research results regarding information security and data protection, as well as some practical aspects of the encryption by CrypTIM algorithm, developed by Prof. V. Ustimenko in the last decade [Ustimenko V., Lecture Notes In Computer Science, 2001, 278, 2227]. This text additionally proposes a practical utilization of the Model Driven system design for large objects (LOB) encryptions within a database, used to store some special large binary files, such as images, sound files, movies, special binary files in order to improve maintenance and data protection. Novel problems and trends in providing security against criminal activities in the current Cyberspace are analyzed.http://dx.doi.org/10.5488/CMP.11.4.761private key cryptographystream ciphersgraph based encryption
spellingShingle Y. Khmelevsky
Information and data protection within a RDBMS
Condensed Matter Physics
private key cryptography
stream ciphers
graph based encryption
title Information and data protection within a RDBMS
title_full Information and data protection within a RDBMS
title_fullStr Information and data protection within a RDBMS
title_full_unstemmed Information and data protection within a RDBMS
title_short Information and data protection within a RDBMS
title_sort information and data protection within a rdbms
topic private key cryptography
stream ciphers
graph based encryption
url http://dx.doi.org/10.5488/CMP.11.4.761
work_keys_str_mv AT ykhmelevsky informationanddataprotectionwithinardbms