Redirigiendo al acceso original de articulo en 15 segundos...
ARTÍCULO
TITULO

Database Secure Manipulation based on Paillier?s Homomorphic Encryption (DSM-PHE)

Somchai Prakancharoen    

Resumen

The objective of this research was to suggest some simple solution to increase database manipulation security. Based on advantage of Homomorphic encryption, user?s data in database is always encrypted by Homomorphic encryption algorithm such as Paillier. User?s data is manipulated or processed on many times such as addition, subtraction, multiplication and division. By the advantage of Homomorphic encryption algorithm, user?s data were no need to decrypt while it was manipulated therefore secrecy of data was still reserved. Unfortunately, Paillier?s Homomorphic encryption is normally coverage only addition and multiplication mathematical data operation. This paper suggests simple technique to enhance Pailler?s encryption algorithm to perform data operation as well in subtraction and division operation. Evaluation in suggested data base manipulation, DSM-PHE, indicates that its operation tasks was five operation times more than ordinary data base manipulation operation tasks, without any encryption. Therefore DSM-PHE should be especially used in more sensitive data.

 Artículos similares

       
 
Bradley Northern, Trey Burks, Marlana Hatcher, Michael Rogers and Denis Ulybyshev    
Since Cyber-Physical Systems (CPS) are widely used in critical infrastructures, it is essential to protect their assets from cyber attacks to increase the level of security, safety and trustworthiness, prevent failure developments, and minimize losses. I... ver más
Revista: Information

 
Heru Susanto, Leu Fang Yie, Fadzliwati Mohiddin, Arief Amier Rahman Setiawan, Parastou Khodaparast Haghi and Desi Setiana    
When the world was engulfed by a COVID-19 pandemic crisis, various activities could not be carried out normally. Activities may continue from home during a crisis by the use of a smartphone through the internet, because almost all people have their own s... ver más

 
?.?. Cherepniov     Pág. 109 - 115
In this paper, we propose a new collective work scheme for performing the task of secure database creation and storage. Such tasks arise when building electronic payment systems and document management systems with distributed responsibility, that is, wh... ver más

 
Chin-Ling Chen, Yong-Yuan Deng, Wei Weng, Hongyu Sun and Ming Zhou    
In recent years, blockchain-related technologies and applications have gradually emerged. Blockchain technology is essentially a decentralized database maintained by the collective, and it is now widely applied in various fields. At the same time, with t... ver más
Revista: Applied Sciences

 
?.?. Cherepniov     Pág. 17 - 23
We consider protocol of secure construction and storage of database, named ?blockchain?. This protocol may be considered as a common electronic signature scheme. In this case, the main parts are mechanisms of random distribution of rights to sign and res... ver más