期刊文献+

数据库中字符型数据的加密及查询

Encryption and Query of Character Data in Database
下载PDF
导出
摘要 加密是保护数据库中敏感信息的一种有效手段,如何在保证数据库安全的同时,实现对加密数据的高效查询是目前的一个难题。在此提出一个针对字符型数据的保存顺序加密方案,能直接在加密数据上执行字符串的等值查询;同时,通过构造索引字段储存字符串的结构信息,使子串查询时只需解密部分相关记录,较大地提高了子串查询性能。最后通过实验验证了加密系统的安全性与查询性能的提高。 Encryption is a good means for protecting sensitive data. However, once encrypted, data will no longer be easily queried from exact matches, This paper presents an order-preserving encryption scheme for string data that is robust against ciphertext only, and allows quality query to be directly applied on encrypted data, without decrypting the operands, In addition, to solve the problem of substring query, an additional field that stores the information of character data is constructed, the field can filter some records of being out of relation to the query, and then decrypt the rest records and implement a refine query on the decrypted data. Results of a set of experiments validate the security of this scheme and improvement of the query performance.
出处 《广西师范大学学报(自然科学版)》 CAS 北大核心 2007年第4期116-119,共4页 Journal of Guangxi Normal University:Natural Science Edition
基金 教育部科学技术研究基金重点项目(205014)
关键词 数据库安全 字符型数据 保序加密 等值查询 子串查询 database security character data order-preserving encryption equality query substring query
  • 相关文献

参考文献6

  • 1张传武,林理彬.安全电子商务系统互操作性测试(英文)[J].广西师范大学学报(自然科学版),2005,23(1):137-140. 被引量:2
  • 2HACIGUMUS H, IYER B R, LI Chen, et al. Executing SQL over encrypted data in the database-service-provider model[C]//Proceedings of the ACM SIGMOD Conference on Management of Data. Madison :ACM,2002:216-227.
  • 3AGRAWAL R, KIERNAN J, SRIKANT R, et al. Order preserving encryption for numeric data[C]//Proceedings of the ACM SIGMOD International Conference on Management of Data. Paris :ACM,2004: 563-574.
  • 4崔宾阁,刘大昕,王桐.支持快速查询的数据库加密方法研究[J].计算机科学,2006,33(6):115-118. 被引量:13
  • 5KONIG A,WEIKUM G. Combining histograms and parametric curve fitting for feedback-driven query result-size estimation[C]//Proceedings of the 25th VLDB Conference, Edinburgh ,, Morgan Kaufmann, 1999,, 423-434.
  • 6RISSANEN J. Stochastic complexity in statistical inquiry[M]. Singapore:World Scientific Publ Co,1989.

二级参考文献11

  • 1Oracle. Oracle9i database security for eBusiness, http://www.oracle.com/technology/deploy/ security/oraclegi/pdf/gisecbpa.pdf. 2001
  • 2Fanghanel T. Using encryption for secure data storage in mobile database systems: [Ph D dissertation]. Jena,Germany:Friedrich Schiller University, 2002
  • 3Hacigumus H, Lyer B, Li Chen, et al. Executing SQL over encrypted data in the database-serve-provider model. The 2002 ACM SIGMOD Int'1 Conf on Management of Data, Madison, Wisconsin, 2002
  • 4王正飞 王曼 汪卫 等.数据库中加密字符数据的存储与查询[J].计算机研究与发展,2004,41(1):66-71.
  • 5TPC-H. Benchmark specification, http://www. tpc. org,2004
  • 6Waters B R, Balfanz D, Durfee G, et al. Building an encrypted and searchable audit log. In: The 11^th Network and Distributed System Security(NDSS)Symposium,San Diego,California,2004
  • 7Chang Yan-Cheng, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data. In: Proceedings of ACNS 2005,Lecture Notes in Computer Science 3531, Springer-Verlag,2005. 442-455
  • 8Song D Xiaodong, Wagner D, Perrig A. Practical techniques for searches on encrypted data. The IEEE Symp on Security and Privacy, Oakland, California, 2000
  • 9Haeigumus H, Lyer Bala, Mehrotra S. Providing database as a service. The 18th Int'l Conf On Data Engineering,San Jose,California, 2002
  • 10He Jingmin, Wang Min. Cryptography and relational database management system. Interactive Dialogue with Educator form Across State, 2001

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部