process, considering the columns’ annotations and
seeds defined in the source code. Then, the data is
retrieved unencrypted or unobfuscated. Integrity was
designed to make all the encryption and data obfus-
cation processing transparent to the system developer
and user. Figure 11 shows the recovered data.
Figure 11: Return data.
When a query with date comparison is performed,
the informed date also goes through the leap process
before the query is performed, so there is no need to
deobfuscate all dates in the column to perform the
comparison.
6 CONCLUSIONS
This work presented a framework for object-relational
mapping that aims to obfuscate the information in
the database, leaving the responsibility of the cryp-
tographic process to the application layer instead of
delegating this process to the database management
system. Likewise, the framework aims to make the
entire process transparent for the developer, who only
needs to interfere in the solution’s source code to de-
fine passwords and which columns will suffer data ob-
fuscation. In this way, developing software consider-
ing the new data protection laws is facilitated.
The data will be stored in the database in an obfus-
cated way. The data that Integrity has persisted will
be meaningless to those who illicitly obtain it if there
is an information leak. Not even the Database Admin-
istrator will have access to such information since the
system development team defines the password and
the name of the attributes used in the cyphering pro-
cess.
As future works, Integrity will be part of the
Spring framework in Java to take advantage of all the
infrastructure already available and for its wide use
in the market. Other types of fields will also be used
in Integrity, such as the Integer since only String and
Date data are currently being used in this version. We
opted for working firstly in two data types to reduce
the scope of this work. Though, as future works, we
intend to integrate data types with a finite body well-
defined, as the IEEE 754 standard data types.
The framework provides the search for exact data
in the database or by date range. However, searching
for data using a String snippet in an obfuscated field
is an open challenge. Thus, solutions to these limita-
tions will be studied and proposed.
REFERENCES
Dang, Q. (2015). Secure Hash Standard. Federal Inf. Pro-
cess. Stds. (NIST FIPS), National Institute of Stan-
dards and Technology, Gaithersburg, MD.
Deshpande, A., Patil, A., Joshi, S., and Bothara, S. (2012).
Article: Dbcrypto: A database encryption system us-
ing query level approach. International Journal of
Computer Applications, 45(8):27–32.
Dworkin, M., Barker, E., Nechvatal, J., Foti, J., Bassham,
L., Roback, E., and Dray, J. (2001). Advanced
Encryption Standard (AES). Federal Inf. Process.
Stds. (NIST FIPS), National Institute of Standards and
Technology, Gaithersburg, MD.
Hintzbergen, J., Hintzbergen, K., Smulders, A., and
Baars, H. (2018). Fundamentos de Seguranc¸a da
Informac¸
˜
ao: com base na ISO 27001 e na ISO 27002.
Brasport.
Kim, D. and Solomon, M. G. (2014). Fundamentos de
seguranc¸a de sistemas de informac¸
˜
ao. LTC, Rio de
Janeiro, 1a edition.
Lorey, K., Buchmann, E., and B
¨
ohm, K. (2016). TEAL:
Transparent Encryption for the Database Abstraction
Layer. In Proceedings of the CAiSE’16 Forum at
the 28th International Conference on Advanced Infor-
mation Systems Engineering, pages 13–17, Ljubljana,
Slovenia.
Pitta, P. E. B., Costa, E., de Siqueira, J. P. L., and Lazarin,
N. M. (2020). LGPD Compliance: A security persis-
tence data layer. In Anais da XVIII Escola Regional de
Redes de Computadores, pages 123–127, Porto Ale-
gre, RS, Brasil. SBC.
Stallings, W. (2015). Criptografia e seguranc¸a de redes:
princ
´
ıpios e pr
´
aticas. Pearson Education do Brasil,
S
˜
ao Paulo, 6 edition.
Tanenbaum, A. (2003). Redes de computadores. Elsevier.
Zhang, M., Xie, G., Wei, S., Song, P., Guo, Z., Liu, Z.,
and Cheng, Z. (2018). Dmsd-fpe: Data masking sys-
tem for database based on format-preserving encryp-
tion. In Wan, J., Lin, K., Zeng, D., Li, J., Xiang, Y.,
Liao, X., Huang, J., and Liu, Z., editors, Cloud Com-
puting, Security, Privacy in New Computing Environ-
ments, pages 216–226, Cham. Springer International
Publishing.
ICEIS 2022 - 24th International Conference on Enterprise Information Systems
266