Hiding the Source Code of Stored Database Programs

The objective of the article is to reveal an approach to hiding the code of stored programs stored in the database. The essence of this approach is the complex use of the method of random permutation of code symbols related to a specific stored program, located in several rows of some attribute of t...

Full description

Bibliographic Details
Main Authors: Vitalii Yesin, Mikolaj Karpinski, Maryna Yesina, Vladyslav Vilihura, Kornel Warwas
Format: Article
Language:English
Published: MDPI AG 2020-12-01
Series:Information
Subjects:
Online Access:https://www.mdpi.com/2078-2489/11/12/576
id doaj-928e3a6def034ec687d338318d0b914b
record_format Article
spelling doaj-928e3a6def034ec687d338318d0b914b2020-12-10T00:04:59ZengMDPI AGInformation2078-24892020-12-011157657610.3390/info11120576Hiding the Source Code of Stored Database ProgramsVitalii Yesin0Mikolaj Karpinski1Maryna Yesina2Vladyslav Vilihura3Kornel Warwas4Department of Security of Information Systems and Technologies, Faculty of Computer Science, V. Karazin National University of Kharkiv, 61022 Kharkiv, UkraineDepartment of Computer Science and Automatics, Faculty of Mechanical Engineering and Computer Science, University of Bielsko-Biala, 43-309 Bielsko-Biala, PolandDepartment of Security of Information Systems and Technologies, Faculty of Computer Science, V. Karazin National University of Kharkiv, 61022 Kharkiv, UkraineDepartment of Security of Information Systems and Technologies, Faculty of Computer Science, V. Karazin National University of Kharkiv, 61022 Kharkiv, UkraineDepartment of Computer Science and Automatics, Faculty of Mechanical Engineering and Computer Science, University of Bielsko-Biala, 43-309 Bielsko-Biala, PolandThe objective of the article is to reveal an approach to hiding the code of stored programs stored in the database. The essence of this approach is the complex use of the method of random permutation of code symbols related to a specific stored program, located in several rows of some attribute of the database system table, as well as the substitution method. Moreover, with the possible substitute of each character obtained after the permutation with another one randomly selected from the Unicode standard, a legitimate user with the appropriate privileges gets access to the source code of the stored program due to the ability to quickly perform the inverse to masking transformation and overwrite the program code into the database. All other users and attackers without knowledge of certain information can only read the codes of stored programs masked with format preserving. The proposed solution is more efficient than the existing methods of hiding the code of stored programs provided by the developers of some modern database management systems (DBMS), since an attacker will need much greater computational and time consumption to disclose the source code of stored programs.https://www.mdpi.com/2078-2489/11/12/576data securitydatabasedata maskingstored program
collection DOAJ
language English
format Article
sources DOAJ
author Vitalii Yesin
Mikolaj Karpinski
Maryna Yesina
Vladyslav Vilihura
Kornel Warwas
spellingShingle Vitalii Yesin
Mikolaj Karpinski
Maryna Yesina
Vladyslav Vilihura
Kornel Warwas
Hiding the Source Code of Stored Database Programs
Information
data security
database
data masking
stored program
author_facet Vitalii Yesin
Mikolaj Karpinski
Maryna Yesina
Vladyslav Vilihura
Kornel Warwas
author_sort Vitalii Yesin
title Hiding the Source Code of Stored Database Programs
title_short Hiding the Source Code of Stored Database Programs
title_full Hiding the Source Code of Stored Database Programs
title_fullStr Hiding the Source Code of Stored Database Programs
title_full_unstemmed Hiding the Source Code of Stored Database Programs
title_sort hiding the source code of stored database programs
publisher MDPI AG
series Information
issn 2078-2489
publishDate 2020-12-01
description The objective of the article is to reveal an approach to hiding the code of stored programs stored in the database. The essence of this approach is the complex use of the method of random permutation of code symbols related to a specific stored program, located in several rows of some attribute of the database system table, as well as the substitution method. Moreover, with the possible substitute of each character obtained after the permutation with another one randomly selected from the Unicode standard, a legitimate user with the appropriate privileges gets access to the source code of the stored program due to the ability to quickly perform the inverse to masking transformation and overwrite the program code into the database. All other users and attackers without knowledge of certain information can only read the codes of stored programs masked with format preserving. The proposed solution is more efficient than the existing methods of hiding the code of stored programs provided by the developers of some modern database management systems (DBMS), since an attacker will need much greater computational and time consumption to disclose the source code of stored programs.
topic data security
database
data masking
stored program
url https://www.mdpi.com/2078-2489/11/12/576
work_keys_str_mv AT vitaliiyesin hidingthesourcecodeofstoreddatabaseprograms
AT mikolajkarpinski hidingthesourcecodeofstoreddatabaseprograms
AT marynayesina hidingthesourcecodeofstoreddatabaseprograms
AT vladyslavvilihura hidingthesourcecodeofstoreddatabaseprograms
AT kornelwarwas hidingthesourcecodeofstoreddatabaseprograms
_version_ 1724387764038795264