期刊文献+

外包数据库系统安全机制研究 被引量:17

Research on Security Mechanisms of Outsourced Database
下载PDF
导出
摘要 在外包数据库系统模式下,组织将数据库业务外包给外部数据库服务器运行,外包服务提供者为数据拥有者及数据库用户提供远程的数据库创建、存储、更新与查询服务。由于外包服务器本身并非完全可信,外包数据库系统带来了一系列安全问题。本文讨论了数据库安全体系的分类,探讨了外包数据库的基本结构,综述了外包数据库在数据加密、密文查询策略、隐私保护、数据完整性验证及基于数据库水印技术的数据库版权保护等安全机制方面的研究现状,介绍了其研究进展,并展望了安全外包数据库系统的发展方向。研究认为,整合多种安全机制,兼顾安全性和可用性两方面的合理需求,是构建外包数据库系统的技术关键。 In the outsourced database model, organizations outsource their data management needs to an external service provider. The service provider offers mechanisms to create, store, update and query the database for the organizations. Since a server is almost never fully trusted, this model introduces several research issues related to data security. This paper discusses the classification of database security system, studies the architecture of outsourced database, overviews the state-of-the-art in database encryption, query policy of encrypted database, privacy protection, data integrity verification, and database copyright protection based on database watermarking, introduces the latest progress in security mechanisms of outsourced database, and looks ahead its future development. A conclusion is drawn at the end of this paper that it is critical to integrate various security mechanisms and trade off the security and the availability to build an outsourced database.
出处 《计算机科学》 CSCD 北大核心 2007年第2期152-156,195,共6页 Computer Science
基金 2005年江苏省高校自然科学研究计划(编号:05KJD520168) 2006年东华大学科技发展基金
关键词 外包数据库 数据库安全 数据库加密 数据完整性 数据库水印 Outsourced database, Database security, Database encryption, Data integrity, Database watermarking
  • 相关文献

参考文献32

  • 1Beimel A, Ishai Y. Information-Theoretic Private Information Retrieval: A Unified Construction: [ECCC Report TR01-015].Feb. 2001
  • 2Chor B, Goldreich O, Kushilevitz E, et. al. Private Information Retrieval. In:Proe. of 36th IEEE Conference on FOCS, 1995
  • 3Marks D G. Inference in MLS Database Systems [J]. IEEE Transaction on Knowledhe and Data Engineering, 1996, 8(1):46-55
  • 4Song Xiaodong D, Wanger D,Perring A. Practical Techniques for Searches on Encrypted Data. In: The IEEE Symp on Security and Privacy, Oakland, California, 2000
  • 5Bertino E,Ooi Beng Chin,Yang Yanjiang,et al. Privacy and Ownership Preserving of Outsourced Medical Data. ICDE, 2005. 521-532
  • 6Mykletun E, Narasimha M, Tsudik G. Authentication and Integrity in Outsourced Databases. In:Proceedings of NDSS 2004, San Diego, California, USA
  • 7Mykletun E,Tsudik G. Incorporating a Secure Coprocessor in the Database-as-a-Service Model. In: IWIA2005 for Future Generation High Performance Processors and Systems, Oahu, Hawaii,USA, Jan. 2005
  • 8Miklau G, Suciu D. Controlling Access to Published Data Using Cryptography. In: VLDB, 2003
  • 9Hacigumus H,Iyer B,Mehrotra S, Providing Database as a Service. In:Proc. of ICDE, 2002
  • 10Haeigumus H, Iyer B, Mehrotra S. Executing SQL over Encrypted Data in Database Service Provider Model. In: Proc, of ACM SIGMOD, 2002

二级参考文献11

  • 1潘承洞 潘承彪.初等数论[M].北京:北京大学出版社,1991..
  • 2Alexander Brodsky,Csilla Farkas,Sushil Jajodia. Secure Databases:Constraints,Inference Channels,and Monitoring Disclosures[J].IEEE Transactions on Knowledge and Data Engineering, 2000; 12 (6)
  • 3S Jajodia,C Meadows. Inference problem in Multilevel Secure Database Management Systems, Information Security[C].In: M D Abrams,S Jajodia,H Podell eds.An Integrated Collection of Essays,Los Alamitos,Cailf:IEEE CS Press, 1995:570~584
  • 4Donald G Marks. Inference in MLS Database Systems[J].IEEE Transactions on Knowledge and Data Engineering,1996;8(1) :46~55
  • 5National Computer Security Center. Polyinstantiation Issues in Secure Database Management Systems[R].NCSC TECHNICAL REPORT-005,Volume 3/5,1996-05
  • 6A Motro,D G Marks,S Jajodia. Aggregation in relational databases:Controlled disclosure of sensitive information[C].In:Proceedings of ESORICS-94,Third European Symposium on Research in Computer Science, Springer-Verlag, Berlin, Germany, 1994: 431~445
  • 7T Su,G Ozsoyoglu. Controlling FD and MVD inferences in multilevel relational database system[J].IEEE Transactions on Knowledge and Data Engineering, 1991 ;3(4) :474~485
  • 8T F Lunt. Aggregation and inference:Facts and fallacies[C].In:proceedings of IEEE Symposium on Security and Privacy,1989~05 :102~109
  • 9Hinke Thomas H.Inference Aggregation Detection in Database Management Systems[C].In:Proc IEEE Symp Research in Security and Privacy ,Oakland, CA ,New York, 1988:96~106
  • 10D E Denning.A Preliminary Note on the Inference Problem in Multilevel Database Systems[C].In :Proceedings of the National Computer Security Center Invitational Workshop on Database Security,1986-06

共引文献37

同被引文献154

引证文献17

二级引证文献61

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部