Relational database security enhancements

مقدم أطروحة جامعية

al-Jabr, Hani Hilal Saadah

مشرف أطروحة جامعية

al-Ajluni, Naim M. M.

أعضاء اللجنة

al-Shalabi, Riyad
Abu al-Suud, Salih Mustafa
al-Shaykh, Asim A. R.

الجامعة

الأكاديمية العربية للعلوم المالية و المصرفية

الكلية

كلية نظم و تكنولوجيا المعلومات

القسم الأكاديمي

قسم نظم المعلومات الحاسوبية

دولة الجامعة

الأردن

الدرجة العلمية

دكتوراه

تاريخ الدرجة العلمية

2008

الملخص الإنجليزي

Database encryption system is considered to be secure when the cipher key is secure and as long as the ciphered data is protected from illegal change.

Most encryption systems depend on exchanging cipher / schedule keys between users via a secure channel of communication.

It is difficult, and often expensive, to provide a secure channel of communication between users.

Therefore; this research has developed a number of approaches that overcome the problem of data integrity and securing key exchanges. First, the work undertaken has involved a checksum algorithm and other techniques for database encryption used with conventional database systems, which also includes Cipher / schedule key generation / management.

In our approach, database security problem has been sub-divided into the following sub-problems : (i) Data integrity through the use of a Checksum Algorithm : Checksum values are calculated as the modulus value of critical data items using a divisor chosen by the system administrator.

Checksum values Pi and Ri are maintained separately, e.

g.

in the database, and used later to validate the integrity of the ith data item stored in the original database. (ii) Data integrity and security through the use of Checksum and an Encryption Algorithm : A cryptographic checksum is computed for critical data in order to protect it against any changes, either direct, i.

e.

intended but illegal changes, or indirect, i.

e.

unintentional illegal changes.

Checksum is created in the filter using an encryption algorithm and a secret key K known only to the filter.

It would also be computed and validated at the filter with each request for database access. (iii) Key Generation / Management: Here, the aim was to design a high performance encryption system, using randomly generated keys.

The design methods employ two different techniques to generate the keys.

The results shows that all approaches proposed are simple and highly effective for the generation of keys for any encryption system.

This was applied in both conventional (i.e.

external to main memory) and also main memory databases. The research undertaken provides an insight into different methodologies involved in implementing encryption / decryption techniques in database systems.

Furthermore, it clearly shows that all approaches developed for both cipher key generation and the mixing of both cipher key / schedule key with a ciphered data block are powerful and flexible enough to be applied to the design of encryption systems for a broad spectrum of problems.

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

الموضوعات

عدد الصفحات

230

قائمة المحتويات

Table of contents.

Abstract.

Chapter One : Introduction.

Chapter Two : Introduction to RDBMS and security services.

Chapter Three : Problem description.

Chapter Four : Data integrity mathematical model.

Chapter Five : Encryption system.

Chapter Six : Impeded key management system.

Chapter Seven : All components integration (checksum, encryption and key management).

Chapter Eight : Test results analysis and discussion.

Chapter Nine : Conclusion.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

al-Jabr, Hani Hilal Saadah. (2008). Relational database security enhancements. (Doctoral dissertations Theses and Dissertations Master). Arab Academy for Financial and Banking Sciences, Jordan
https://search.emarefa.net/detail/BIM-306350

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

al-Jabr, Hani Hilal Saadah. Relational database security enhancements. (Doctoral dissertations Theses and Dissertations Master). Arab Academy for Financial and Banking Sciences. (2008).
https://search.emarefa.net/detail/BIM-306350

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

al-Jabr, Hani Hilal Saadah. (2008). Relational database security enhancements. (Doctoral dissertations Theses and Dissertations Master). Arab Academy for Financial and Banking Sciences, Jordan
https://search.emarefa.net/detail/BIM-306350

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-306350