2020
DOI: 10.1615/telecomradeng.v79.i12.20
|View full text |Cite
|
Sign up to set email alerts
|

Monitoring the Integrity and Authenticity of Stored Database Objects

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 0 publications
0
5
0
1
Order By: Relevance
“…They provide secure covert (without leaving a trace in the existing means of documenting completed queries) automatic extraction and decryption (without showing the plaintext) required to find encrypted data using keys stored in R sec . At the same time, using the method based on the use of the potential of the modern blockchain model described in [33,34], the integrity of the key table and persistent stored system and user modules, as well as modules of special software developed within the framework of the proposed approach, is controlled. This increases the security of stored data and special software (increases protection against unauthorized modification, including through malware) with lower overhead costs (the amount of data stored for this and computing resources).…”
Section: Main Security Aspectsmentioning
confidence: 99%
“…They provide secure covert (without leaving a trace in the existing means of documenting completed queries) automatic extraction and decryption (without showing the plaintext) required to find encrypted data using keys stored in R sec . At the same time, using the method based on the use of the potential of the modern blockchain model described in [33,34], the integrity of the key table and persistent stored system and user modules, as well as modules of special software developed within the framework of the proposed approach, is controlled. This increases the security of stored data and special software (increases protection against unauthorized modification, including through malware) with lower overhead costs (the amount of data stored for this and computing resources).…”
Section: Main Security Aspectsmentioning
confidence: 99%
“…Constant monitoring of these database objects (as CDI elements) is very important, since some of the attacks on the database (although not only on it, as, for example, you can attack the operating system through the vulnerabilities of the database server) can be detected precisely based on the modification analysis (intentional or accidental) of these objects (violation of their integrity) or their set (increase or decrease in their number) on the database server. Therefore, to ensure the possibility of monitoring the integrity of such stored modules, including those related to the DB schema with UBR, using the potential of the modern blockchain model, as shown in [42], the following have been developed:…”
Section: Applying the Clark-wilson Model Recommendations To Ensure The Integrity Of Databases With The Universal Basis Of Relationsmentioning
confidence: 99%
“…On the DBMS server, the integrity control of the persistent stored modules, as described above, can be established with a certain periodicity as part of the audit with the recording of relevant information in the audit log with its subsequent analysis and taking effective measures. At that, the integrity check of a certain PSM can be initiated by any of the legitimate users of the system, who will contact the server with a corresponding request, which is described in more detail in [42].…”
Section: Applying the Clark-wilson Model Recommendations To Ensure The Integrity Of Databases With The Universal Basis Of Relationsmentioning
confidence: 99%
“… IVP (integrity verification procedure) -процедура проверки целостности CDI (процедура, которая сканирует элементы данных и подтверждает их целостность, например путем расчета контрольной суммы или используя возможности современной блокчейновой модели, как это показано в работе [8]);  TP (transformation procedure) -процедура преобразования -компонент, который может инициировать транзакцию (последовательность операций), переводящую систему из одного состояния в другое. Процедуры преобразования единственные процедуры, которым разрешено изменять CDI .…”
Section: модель кларка -вилсонаunclassified