Q3 Computer Science
Aremu Idris Aremu, Ibitoye Akinfola Akinrinnola, Nwaocha Vivian Ogochukwu
{"title":"Novel Access Control Mechanism Based New Chinese Remainder Theorem II (New Crt II)","authors":"Aremu Idris Aremu, Ibitoye Akinfola Akinrinnola, Nwaocha Vivian Ogochukwu","doi":"10.11648/j.ijiis.20211003.12","DOIUrl":null,"url":null,"abstract":"Security is a very vital concern in information system in this modern day. The protection of confidential files and integrity of information kept in the database are also of great important, the security model play an important role in protecting the privacy and integrity of messages in the database from unlawful users is a formal method to verify and describe intricate information system. An access Control mechanism is a main strategy for prevention and protection of the classified files in a database; this is carried out by restricting rights of access for different approved users of these files. This paper proposes a novel access control mechanism based on Chinese remainder theorem II which implements a single-key-lock system to encrypt one key called a secret key which is used for both encryption and decryption in the electronic information system for accessing the database. The key to be used in the decryption process must be exchanged between the entities in communication using symmetric encryption for the users to have access to the database. This method represents flocks and keys which is highly efficient and proficient. Also, this implementation can be achieved using the Chinese remainder theorem which executes faster operations and enables simpler construction of keys and locks to be provide for user to have access to control.","PeriodicalId":39658,"journal":{"name":"International Journal of Intelligent Information and Database Systems","volume":"16 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Intelligent Information and Database Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.11648/j.ijiis.20211003.12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

摘要

在当今时代,信息系统的安全性是一个非常重要的问题。保护数据库中保存的机密文件和信息的完整性也非常重要,安全模型对保护数据库中信息的私密性和完整性起着重要的作用,是验证和描述复杂信息系统的一种正式方法。访问控制机制是预防和保护数据库机密文件的主要策略;这是通过限制这些文件的不同批准用户的访问权限来实现的。本文提出了一种新的基于中国剩余定理II的访问控制机制,该机制实现了一个单密钥锁系统,对一个密钥进行加密,该密钥在电子信息系统中用于访问数据库的加密和解密。解密过程中使用的密钥必须在通信实体之间使用对称加密进行交换,以便用户能够访问数据库。这种方法代表了羊群和钥匙,效率很高,很熟练。此外,这种实现可以使用中国剩余定理来实现,该定理执行更快的操作,并且可以为用户提供更简单的密钥和锁的构造,以获得控制权。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Novel Access Control Mechanism Based New Chinese Remainder Theorem II (New Crt II)
Security is a very vital concern in information system in this modern day. The protection of confidential files and integrity of information kept in the database are also of great important, the security model play an important role in protecting the privacy and integrity of messages in the database from unlawful users is a formal method to verify and describe intricate information system. An access Control mechanism is a main strategy for prevention and protection of the classified files in a database; this is carried out by restricting rights of access for different approved users of these files. This paper proposes a novel access control mechanism based on Chinese remainder theorem II which implements a single-key-lock system to encrypt one key called a secret key which is used for both encryption and decryption in the electronic information system for accessing the database. The key to be used in the decryption process must be exchanged between the entities in communication using symmetric encryption for the users to have access to the database. This method represents flocks and keys which is highly efficient and proficient. Also, this implementation can be achieved using the Chinese remainder theorem which executes faster operations and enables simpler construction of keys and locks to be provide for user to have access to control.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
2.90
自引率
0.00%
发文量
21
期刊介绍: Intelligent information systems and intelligent database systems are a very dynamically developing field in computer sciences. IJIIDS provides a medium for exchanging scientific research and technological achievements accomplished by the international community. It focuses on research in applications of advanced intelligent technologies for data storing and processing in a wide-ranging context. The issues addressed by IJIIDS involve solutions of real-life problems, in which it is necessary to apply intelligent technologies for achieving effective results. The emphasis of the reported work is on new and original research and technological developments rather than reports on the application of existing technology to different sets of data.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信