Hiding the Source Code of Stored Database Programs
The objective of the article is to reveal an approach to hiding the code of stored programs stored in the database. The essence of this approach is the complex use of the method of random permutation of code symbols related to a specific stored program, located in several rows of some attribute of t...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-12-01
|
Series: | Information |
Subjects: | |
Online Access: | https://www.mdpi.com/2078-2489/11/12/576 |
id |
doaj-928e3a6def034ec687d338318d0b914b |
---|---|
record_format |
Article |
spelling |
doaj-928e3a6def034ec687d338318d0b914b2020-12-10T00:04:59ZengMDPI AGInformation2078-24892020-12-011157657610.3390/info11120576Hiding the Source Code of Stored Database ProgramsVitalii Yesin0Mikolaj Karpinski1Maryna Yesina2Vladyslav Vilihura3Kornel Warwas4Department of Security of Information Systems and Technologies, Faculty of Computer Science, V. Karazin National University of Kharkiv, 61022 Kharkiv, UkraineDepartment of Computer Science and Automatics, Faculty of Mechanical Engineering and Computer Science, University of Bielsko-Biala, 43-309 Bielsko-Biala, PolandDepartment of Security of Information Systems and Technologies, Faculty of Computer Science, V. Karazin National University of Kharkiv, 61022 Kharkiv, UkraineDepartment of Security of Information Systems and Technologies, Faculty of Computer Science, V. Karazin National University of Kharkiv, 61022 Kharkiv, UkraineDepartment of Computer Science and Automatics, Faculty of Mechanical Engineering and Computer Science, University of Bielsko-Biala, 43-309 Bielsko-Biala, PolandThe objective of the article is to reveal an approach to hiding the code of stored programs stored in the database. The essence of this approach is the complex use of the method of random permutation of code symbols related to a specific stored program, located in several rows of some attribute of the database system table, as well as the substitution method. Moreover, with the possible substitute of each character obtained after the permutation with another one randomly selected from the Unicode standard, a legitimate user with the appropriate privileges gets access to the source code of the stored program due to the ability to quickly perform the inverse to masking transformation and overwrite the program code into the database. All other users and attackers without knowledge of certain information can only read the codes of stored programs masked with format preserving. The proposed solution is more efficient than the existing methods of hiding the code of stored programs provided by the developers of some modern database management systems (DBMS), since an attacker will need much greater computational and time consumption to disclose the source code of stored programs.https://www.mdpi.com/2078-2489/11/12/576data securitydatabasedata maskingstored program |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Vitalii Yesin Mikolaj Karpinski Maryna Yesina Vladyslav Vilihura Kornel Warwas |
spellingShingle |
Vitalii Yesin Mikolaj Karpinski Maryna Yesina Vladyslav Vilihura Kornel Warwas Hiding the Source Code of Stored Database Programs Information data security database data masking stored program |
author_facet |
Vitalii Yesin Mikolaj Karpinski Maryna Yesina Vladyslav Vilihura Kornel Warwas |
author_sort |
Vitalii Yesin |
title |
Hiding the Source Code of Stored Database Programs |
title_short |
Hiding the Source Code of Stored Database Programs |
title_full |
Hiding the Source Code of Stored Database Programs |
title_fullStr |
Hiding the Source Code of Stored Database Programs |
title_full_unstemmed |
Hiding the Source Code of Stored Database Programs |
title_sort |
hiding the source code of stored database programs |
publisher |
MDPI AG |
series |
Information |
issn |
2078-2489 |
publishDate |
2020-12-01 |
description |
The objective of the article is to reveal an approach to hiding the code of stored programs stored in the database. The essence of this approach is the complex use of the method of random permutation of code symbols related to a specific stored program, located in several rows of some attribute of the database system table, as well as the substitution method. Moreover, with the possible substitute of each character obtained after the permutation with another one randomly selected from the Unicode standard, a legitimate user with the appropriate privileges gets access to the source code of the stored program due to the ability to quickly perform the inverse to masking transformation and overwrite the program code into the database. All other users and attackers without knowledge of certain information can only read the codes of stored programs masked with format preserving. The proposed solution is more efficient than the existing methods of hiding the code of stored programs provided by the developers of some modern database management systems (DBMS), since an attacker will need much greater computational and time consumption to disclose the source code of stored programs. |
topic |
data security database data masking stored program |
url |
https://www.mdpi.com/2078-2489/11/12/576 |
work_keys_str_mv |
AT vitaliiyesin hidingthesourcecodeofstoreddatabaseprograms AT mikolajkarpinski hidingthesourcecodeofstoreddatabaseprograms AT marynayesina hidingthesourcecodeofstoreddatabaseprograms AT vladyslavvilihura hidingthesourcecodeofstoreddatabaseprograms AT kornelwarwas hidingthesourcecodeofstoreddatabaseprograms |
_version_ |
1724387764038795264 |