期刊文献+

外包数据库的新模式——虚拟服务器结构 被引量:1

Virtual server architecture:new mode for outsourcing database
下载PDF
导出
摘要 从安全性与可操作性的双重需求出发构造一个外包数据库模式分析框架,提出基于虚拟服务器模式(virtual server architecture,VSA)的外包数据库模式,并设计以同态密文操作策略为核心技术的系统实现方案,证实VSA模式相对于传统模式的优势。 From the perspective of balance of commercial and technical requirement, first formalized a dual requirement framework for analysis of outcourcing database architecture. And then put forward a new outsourcing DB architecture, virtual server architecture and developed a prototype system with a homomorphic encrypted database operation policy. Under the framework above VSA was proved more advanced than the traditional mode.
出处 《计算机应用研究》 CSCD 北大核心 2009年第11期4151-4154,共4页 Application Research of Computers
关键词 外包数据库 可操作性 信息安全 虚拟服务器模式 database outsourcing database operation information security virtual server architecture
  • 相关文献

参考文献8

  • 1HACIGUMUS H, IYER B, MEHROTRA S. Providing database as a service[ C]//Proc of ICDE. 2002.
  • 2赵晓峰,叶震.几种数据库加密方法的研究与比较[J].计算机技术与发展,2007,17(2):219-222. 被引量:18
  • 3RIVEST R L, ADLEMAN L, DERTOUZOS M L. On data banks and privacy homomorphisms[ M]//DeMILLO R A, et al. Foundations of secure computation. New York: Academic Press, 1978.
  • 4戴一奇,尚杰,苏中民.密文数据库的快速检索[J].清华大学学报(自然科学版),1997,37(4):24-27. 被引量:21
  • 5DAVIDA G I,WELLS D L, KAM J B. A database encryption system with subkeys[ J]. ACM Trans on Database Systems, 1981, 6 (2) :312-328.
  • 6HACIGUMUS H, IYER B, MEHROTRA S. Executing SQL over encrypted data in the database-service-provider model [ C]//Proc of ACM SIGMOD International Conference on Management of Data. 2002:216-227.
  • 7XIONG Li, CHITTI S, LIU Ling. Preserving data privacy in outsourcing data aggregation services [ J]. ACM Trans on Intemet Technology, 2007, 7(3):17.
  • 8ATENIESE G, BURNS R, CURTMOLA R. Provable data possession at untrusted stores[ C]//De CAPITANI di VIMERCATI S, SYVERSON P. Proc of CCS 2007. New York:ACM Press, 2007:598-609.

二级参考文献15

  • 1杨勇,方勇,周安民.秘密同态技术研究及其算法实现[J].计算机工程,2005,31(2):157-159. 被引量:18
  • 2戴一奇,尚杰,陈卫,苏中民.一种新的数据库加密密钥管理方案[J].清华大学学报(自然科学版),1995,35(4):43-47. 被引量:17
  • 3戴一奇,尚杰,苏中民.密文数据库的快速检索[J].清华大学学报(自然科学版),1997,37(4):24-27. 被引量:21
  • 4戴一奇,清华大学学报,1995年,35卷,4期,43页
  • 5陈卫,清华大学学报,1994年,34卷,1期,99页
  • 6Rivest R L,Adleman L,Dertouzos M L.On Data Banks and Privacy Homomorphism[C]//In DeMillo R D.Foundations of Secure Computations.[s.l.]:Academic Press,1978:169-177.
  • 7Domingo-Ferrer J.A New Privacy and Homomorphism Applications[J].Information Processing Letters,1996,60(5):277-282.
  • 8Hacigumus H,Iyer B,Li C,et al.Executing SQL over Encrypted Data in the Database-Dervice-Provider Model[C]//In Proceedings SIGMOD 02,Madison,International Conference on Management of Data.Wisconsin,USA:[s.n.],2002:216-227.
  • 9Fischmann M,Gunther O.Privacy Tradeoffs in Database Service Architectures[C]//In Proceedings of BIZSEC 03,the First ACM Workshop on Business Driven Security Engineering.Berlin,Germany:[s.n.],2003.
  • 10Davida G I,Wells D H,Kam J H.A Database Encryption System with Subkeys[J].ACM Trans on Database Systems,1981(6):31-37.

共引文献37

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部