A new solution to protect encryption keys when encrypting database at the application level

3Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

Encrypting databases at the application level (client level) is one of the most effective ways to secure data. This strategy of data security has the advantage of resisting attacks performed by the database administrators. Although the data and encryption keys will be necessarily stored in the clear on the client level, which implies a problem of trust viz-a-viz the client since it is not always a trusted site. The client can attack encryption keys at any time. In this work, we will propose an original solution that protects encryption keys against internal attacks when implementing database encryption at the application level. The principle of our solution is to transform the encryption keys defined in the application files into other keys considered as the real keys, for encryption and decryption of the database, by using the protection functions stored within the database server. Our proposed solution is considered as an effective way to secure keys, especially if the server is a trusted site. The solution implementation results displayed better protection of encryption keys and an efficient process of data encryption /decryption. In fact, any malicious attempt performed by the client to hold encryption keys from the application level cannot be succeeded since the real values of keys are not defined on it.

References Powered by Scopus

EnclaveDB: A Secure Database Using SGX

228Citations
186Readers
Get full text
65Citations
104Readers
Get full text

Cited by Powered by Scopus

Get full text
1Citations
9Readers
Get full text
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

El Bouchti, K., Ziti, S., Omary, F., & Kharmoum, N. (2020). A new solution to protect encryption keys when encrypting database at the application level. International Journal of Advanced Computer Science and Applications, 11(1), 307–312. https://doi.org/10.14569/ijacsa.2020.0110138

Readers over time

‘20‘22‘2401234

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 2

67%

Researcher 1

33%

Readers' Discipline

Tooltip

Computer Science 2

67%

Social Sciences 1

33%

Save time finding and organizing research with Mendeley

Sign up for free
0