Information and data protection within a RDBMS
Security issues for some special large data, such as binary and image files, as well as video and audio files and streams still require a special development, especially for the industrial database systems (Oracle, MS SQL, DB2, etc). New encryption methods should be used additionally to traditional...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute for Condensed Matter Physics
2008-12-01
|
Series: | Condensed Matter Physics |
Subjects: | |
Online Access: | http://dx.doi.org/10.5488/CMP.11.4.761 |
_version_ | 1818329052023357440 |
---|---|
author | Y. Khmelevsky |
author_facet | Y. Khmelevsky |
author_sort | Y. Khmelevsky |
collection | DOAJ |
description | Security issues for some special large data, such as binary and image files, as well as video and audio files and streams still require a special development, especially for the industrial database systems (Oracle, MS SQL, DB2, etc). New encryption methods should be used additionally to traditional encryption methods and other protection solutions, such as authentication, authorization, access control, security monitoring and audit. The purpose of this article is to present the research results regarding information security and data protection, as well as some practical aspects of the encryption by CrypTIM algorithm, developed by Prof. V. Ustimenko in the last decade [Ustimenko V., Lecture Notes In Computer Science, 2001, 278, 2227]. This text additionally proposes a practical utilization of the Model Driven system design for large objects (LOB) encryptions within a database, used to store some special large binary files, such as images, sound files, movies, special binary files in order to improve maintenance and data protection. Novel problems and trends in providing security against criminal activities in the current Cyberspace are analyzed. |
first_indexed | 2024-12-13T12:41:55Z |
format | Article |
id | doaj.art-ecf227f8362b449594979274d8255446 |
institution | Directory Open Access Journal |
issn | 1607-324X |
language | English |
last_indexed | 2024-12-13T12:41:55Z |
publishDate | 2008-12-01 |
publisher | Institute for Condensed Matter Physics |
record_format | Article |
series | Condensed Matter Physics |
spelling | doaj.art-ecf227f8362b449594979274d82554462022-12-21T23:45:37ZengInstitute for Condensed Matter PhysicsCondensed Matter Physics1607-324X2008-12-01114761Information and data protection within a RDBMSY. KhmelevskySecurity issues for some special large data, such as binary and image files, as well as video and audio files and streams still require a special development, especially for the industrial database systems (Oracle, MS SQL, DB2, etc). New encryption methods should be used additionally to traditional encryption methods and other protection solutions, such as authentication, authorization, access control, security monitoring and audit. The purpose of this article is to present the research results regarding information security and data protection, as well as some practical aspects of the encryption by CrypTIM algorithm, developed by Prof. V. Ustimenko in the last decade [Ustimenko V., Lecture Notes In Computer Science, 2001, 278, 2227]. This text additionally proposes a practical utilization of the Model Driven system design for large objects (LOB) encryptions within a database, used to store some special large binary files, such as images, sound files, movies, special binary files in order to improve maintenance and data protection. Novel problems and trends in providing security against criminal activities in the current Cyberspace are analyzed.http://dx.doi.org/10.5488/CMP.11.4.761private key cryptographystream ciphersgraph based encryption |
spellingShingle | Y. Khmelevsky Information and data protection within a RDBMS Condensed Matter Physics private key cryptography stream ciphers graph based encryption |
title | Information and data protection within a RDBMS |
title_full | Information and data protection within a RDBMS |
title_fullStr | Information and data protection within a RDBMS |
title_full_unstemmed | Information and data protection within a RDBMS |
title_short | Information and data protection within a RDBMS |
title_sort | information and data protection within a rdbms |
topic | private key cryptography stream ciphers graph based encryption |
url | http://dx.doi.org/10.5488/CMP.11.4.761 |
work_keys_str_mv | AT ykhmelevsky informationanddataprotectionwithinardbms |