期刊文献+

加密数据的一种高效查询方法 被引量:6

Efficient method of querying encrypted data
下载PDF
导出
摘要 加密技术是保护数据库中数据安全的一种有效方法,但如何对加密数据进行高效查询是一个难点,引起了研究界的重视。针对这个问题,除了采用常规加密方法对字符数据进行加密外,还对字符数据进行扁平化和扰乱化处理,并把处理后的特征值作为附加字段与加密数据一起存储。该方法不仅安全性很好,而且通过实验证明其性能较传统方法有很大提高。 Encryption technology has become an important mechanism of securing data stored in database.However,it is difficult to search efficiently the encrypted data and many researchers take it into consideration.To solve the problem,a novel way is proposed,we not only encrypt the character data by using the conventional encrypted algorithms,but also adopt the way of flatting and scrambling,and then store the translated characteristic values together with the encrypted data in the encrypted table.The approach can provide better security,and results of experiments validate the performance of our approach compared with the conventional approach.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第12期29-33,共5页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.69933010) 湖南省教育厅资助科研课题(the Re-search Project of Department of Education of Hunan Province, China under Grant No.07C400)
关键词 数据库安全 加密数据 查询 性能 database security encrypted data query performance
  • 相关文献

参考文献15

  • 1Lyer B,Mehrotra S,Mykletun E,et al.A framework for efficient storage security in RDBMS[C]//LNCS 2992:the Proc of the 9th International Conference on Extending Database Technology(EDBT),2004: 147-164.
  • 2Hacigumus H,Lyer B,Mehrotra S.Providing database as a service[C]// Proc of ICDE 2002,2002:29-38.
  • 3Chen Y,Chu W W.Database security protection via inference detection[C]//IEEE International Conference on Intelligence and Security Informatics,May 2006.
  • 4Sesay S,Yang Zong-kai,Chen Jing-wen,et al.A secure database encryption scheme[C]//Consumer Communications and Networking Conference,Jan 2005:49-53.
  • 5Beaver K.Encryption enhancements in SQL Server 2005.Microsoft SQL Server,June 2006.
  • 6Bebek G.Anti-tamper database research:inference control techniques, EECS433 final report[R].Case Western Reserve University,2002.
  • 7Hacigumus H,Lyer B,Li C,et al.Executing SQL over encrypted data in the database-server-provider model[C]//Proc of ACM SIGMOD,2002:216-227.
  • 8Hore B,Mehrotra S,Tsudik G.A privacy-preserving index for range queries[C]//Proc of 30th International Conference on Very Large Databases, Toronto, Canada, 2004: 720-731.
  • 9Agrawal R, Kirenan J, Srikant R,et al.Order-preserving encryption for numeric data[C]//Proc of the ACM SIGMOD,Paris,France,2004: 563-574.
  • 10Bouganim L,Pucheral P.Chip-secured data access:confidential data on untrusted servers[C]//Proc of 28th International Conference on Very Large Databases, Hong Kong, China, 2002 : 131-142.

同被引文献61

引证文献6

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部