期刊文献+

关于外包数据库完整性验证的研究 被引量:3

Research on Integrity Verification of Outsourcing Database
下载PDF
导出
摘要 数据库外包是一种重要的新兴的趋势,它让数据所有者把他们的数据管理工作委托给一个外部服务商。服务商管理客户的数据库,为客户提供安全可靠的机制来创建、存储、更新和访问他们自己的数据库。这种模式引出了数据安全的研究议题,文中通过对比几种不同的签名方式,提出了有效的数据完整性机制模型和安全有效的压缩RSA方案来确保数据的完整性和真实性。它在单一客户端和多查询者模型中运行良好,同时保证了计算量和带宽损耗在最低范围内。 Database outsourcing is an important emerging trend which involves data owners delegating their data management needs to an external service provider. The service provider hosts clients' databases and offers seamless mechanisms to create,store,update and access their databases.This model introduces several research issues related to data security.By comparing the signatures of several different ways,conclude with effective mechanisms for data integrity model and a safe and efficient condensed-RSA program to ensure data integrity and authenticity.It works well in a unified client and muti-querier model,while ensuring that the computational and bandwidth overhead at the lowest range.
出处 《计算机技术与发展》 2010年第5期150-153,157,共5页 Computer Technology and Development
关键词 外包数据库(ODB) 完整性 压缩RSA outsourced database integrity condensed-RSA
  • 相关文献

参考文献7

  • 1Hacigümüs H,Iyer B,Mehrotra S.Providing Database as a Service[C]//In International Conference on Data Engineering.Washington:IEEE Computer Society,2002:29-40.
  • 2赵晓峰,叶震.几种数据库加密方法的研究与比较[J].计算机技术与发展,2007,17(2):219-222. 被引量:18
  • 3王平水,赵俊杰.多用户环境中签名方案的安全性研究[J].计算机技术与发展,2009,19(1):157-160. 被引量:2
  • 4Bellare M,Garay J,Rabin T.Fast batch verification for modular exponentiation and digital signatures[C]//In Advances in Cryptology-EUROCRYPT '98,LNCS1403.Berlin:Springer-Verlag,1998:191-204.
  • 5Bellare M,Rogaway P.Random oracles are practical:a paradigm for designing efficient protocols[M].New York:ACM Press,1993:62-73.
  • 6Boneh D,Gentry C,Lynn B,et al.Aggregate and Verifiably Encrypted Signatures from Bilinear Maps[C]//In Advances in Cryptology-EUROCRYPT '2003,LNCS2656.Berlin:Springer-Verlag,2003:416-432.
  • 7OpenSSL Project[EB/OL].2009-04-21.http://www.openssl.org.

二级参考文献18

  • 1杨勇,方勇,周安民.秘密同态技术研究及其算法实现[J].计算机工程,2005,31(2):157-159. 被引量:18
  • 2戴一奇,尚杰,陈卫,苏中民.一种新的数据库加密密钥管理方案[J].清华大学学报(自然科学版),1995,35(4):43-47. 被引量:17
  • 3王纯.数字签名安全性研究[J].电脑与电信,2006(11):43-45. 被引量:2
  • 4戴一奇,尚杰,苏中民.密文数据库的快速检索[J].清华大学学报(自然科学版),1997,37(4):24-27. 被引量:21
  • 5Bellare M, Rogaway P. Entity authentication and key distribution[C] ff In Advances in Cryptology - Euro - Crypt' 93, LNCS773. Berlin: Springer - Verlag, 1993 : 232 - 249.
  • 6Bellare M, Boldyreva A, Micali S. Public - key encryption in a multi-user setting: security proofs and improvements[C] //In Advances in Cryptology - Ettro - Cryption' 2000, LNCS1807. Berlin: Springer - Verlag, 2000: 259 - 274.
  • 7Pointcheval D, Stem J. Security arguments for digital signatures and blind signatures[J ]. Journal of Cryptology, 2000,13 (3) :361 - 396.
  • 8Rivest R L,Adleman L,Dertouzos M L.On Data Banks and Privacy Homomorphism[C]//In DeMillo R D.Foundations of Secure Computations.[s.l.]:Academic Press,1978:169-177.
  • 9Domingo-Ferrer J.A New Privacy and Homomorphism Applications[J].Information Processing Letters,1996,60(5):277-282.
  • 10Hacigumus H,Iyer B,Li C,et al.Executing SQL over Encrypted Data in the Database-Dervice-Provider Model[C]//In Proceedings SIGMOD 02,Madison,International Conference on Management of Data.Wisconsin,USA:[s.n.],2002:216-227.

共引文献18

同被引文献94

  • 1孟凡奇.一种在JSP页面上分页显示Oracle中记录的方法[J].科技创新导报,2007,4(36). 被引量:2
  • 2朱勤,于守健,乐嘉锦,骆轶姝.外包数据库系统安全机制研究[J].计算机科学,2007,34(2):152-156. 被引量:17
  • 3洪澄,张敏,冯登国.AB-ACCS:一种云存储密文访问控制方法[J].计算机研究与发展,2010,47(Z1):259-265.
  • 4王君,祝永志,魏榕晖,李丙锋.基于Oracle分布式数据库的查询优化[J].计算机技术与发展,2008,18(1):157-160. 被引量:8
  • 5TechCrunch. iPad breach update: more personal data was potentially at risk[EB/OL]. http://techcrunch.coml2010106115/iPad-breach-personaldatal,2010.
  • 6ITGI. Global status report on the gorvance of enterprise IT (GETIT)- 2011[EB/OL].http://www.isaca.orglITGI-Global-Survey-Results, 2011.
  • 7GOLDREICH O. Towards a theory of software protection and simulation by oblivious RAMs[A]. STOC[C]. 1987.
  • 8OSTROVSKY R, SHOUP V. Private information storage (extended abstract)[A]. STOC[C]. 1997.294-303.
  • 9GOLDREICH 0, OSTROVSKY R. Software protection and simulation on oblivious RAMs[J]. JACM, 1996,43(3): 431-473.
  • 10OSTROVSKY R. Efficient computation on oblivious RAMs[A]. ACM Symposium on Theory ofComputing(STOC)[C]. 1990.

引证文献3

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部