期刊文献+

一种基于信息分解与合成的数据库加密方法 被引量:4

A Database Encryption Method Based on Information Dissociation and Association
在线阅读 下载PDF
导出
摘要 针对数据库加密后检索与运行效率低、SQL查询操作受制约等问题,本文提出了一种不依赖数据值加密的新型数据库加密方法。该方法根据关系数据库中数据是结构化的这一特征,通过信息分解与信息合成的思想来保障数据库安全。同时,本文还给出了信息分解与合成的定义和基本准则;描述了该加密方法上的查询处理过程。最后,通过实验与传统数据库加密技术进行了性能比较。 Aiming at the issues of lower efficiency on database queries or processing and limited SQL queries, a kind of database encryption method is presented in this paper. Unlike traditional database encryption methods, it does not rely on data encryption. According to the characteristics that the data is structured in relational databases,it implements data security through information dissociation and information association. Meanwhile, the definition and rules of information dissociation and association are presented in this paper, and the query processing of the method is described. Finally, a performance comparison is performed with traditional database encryption through experiments.
出处 《计算机工程与科学》 CSCD 2007年第10期54-56,60,共4页 Computer Engineering & Science
基金 教育部科学技术研究重点项目(205014)
关键词 数据库加密 安全 信息分解 信息合成 database encryption security information dissociation information association
作者简介 李现伟(1980-),男,河北邢台人,硕士生,研究方向为数据库加密;通讯地址:066004河北省秦皇岛市燕山大学西校区1306信箱;Tel:13785922831;E-mail:lixianwei721@163.com Address:SchoolofInformationScienceandEngineering,YanshanUniversity,Qinhuangdao,Hebei066004。P.R.China 刘国华,教授,博士生导师,研究方向为数据库理论、空间数据库、数据库安全等。
  • 相关文献

参考文献6

  • 1Ozsoyoglu G,Singer D A,Chung S S. Anti-Tamper Database: Querying Encrypted Database[A]. Proc of the 17th Annual IFIP WGll. 3 Working Conf on Database and Application Securlty[C]. 2003.
  • 2Hacigumus H, Iyer B, Li C, et al. Executing SQL over Encrypted Data in the Database-Service-Provider Model [A]. Proc of ACMSIGMOD Conf on Management of Data [C]. 2002. 216-227.
  • 3Agarwal R, Kierman J, Srikant R, et al. Order Preserving Encryption for Numeric Data[A]. Proc of ACM SIGMOD Conf on Management of Data[C]. 2004.
  • 4Motro A, Parisi-Presiece F. Blind Custodians.. A Database Service Architecture That Supports Privacy Without Encryption[A]. Proc of Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conf on Data and Applications Security[C]. 2005. 338-352.
  • 5Xiao Xiaokui,Tao Yufei. Anatomy: Simple and Effective Privacy Preservatlon[A]. Proc of VLDB ' 06[C]. 2006. 139-150.
  • 6Schneier B. Description of a New Variable-Length Key, Block Cipher (blowfish), Fast Software Encryption [A]. Proc of Cambridge Security Workshop[C]. 1994.

同被引文献20

  • 1王元珍,冯超.数据库加密系统的研究与实现[J].计算机工程与应用,2005,41(8):170-172. 被引量:44
  • 2Wang Cong,Ren Kui,Lou Wenjing, et al. Toward publicly auditable secure cloud data storage services [ J ]. IEEE Network,2010,24 (4) :19-24.
  • 3Wang Cong, Wang Qian, Ren Kui,et al. Ensuring data storage securi- ty in cloud computing [ C ]//Proc of the 17th International Workshop on Quality of Service. 2009 : 1-9.
  • 4JOSHI J B D, BERTINO E, GHAFOOR A. Hybrid role hierarchy for generalized temporal role based access control model [A]. Proceedings of the Annual Interna- tional Computer Software and Applications Conference [ C ]. Oxford, England, 2002: 951-956.
  • 5LI N,TRIPUNITARA M V,BIZRI Z. On mutually exclusive roles and separation-of-duty[J ]. ACM Transactions on Infor- mation and System Security, 2007, 10(2 ): 40-63.
  • 6Christine Parent,Stefano Spaccapietra.lssues and approaches of database integration [ J ].Communications of the ACM. 2013 (5es):44-62.
  • 7T. Jian,F. Lijian.Cloud computing-based Design of Network Teaching System[J]. Journal of TaiYuan Urban Vocational col- lege, 2010.
  • 8周水庚,李丰,陶宇飞,肖小奎.面向数据库应用的隐私保护研究综述[J].计算机学报,2009,32(5):847-861. 被引量:222
  • 9刘玉葆,黄志兰,傅慰慈,印鉴.基于有损分解的数据隐私保护方法[J].计算机研究与发展,2009,46(7):1217-1225. 被引量:21
  • 10王淑营.面向产业链协同商务平台的权限控制模型研究[J].计算机应用研究,2010,27(1):170-173. 被引量:6

引证文献4

二级引证文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部