期刊文献+

外包数据库模型中文本数据的完整性检测方案 被引量:4

Text Data Integrity Detection Scheme in Outsourced Database Modal
下载PDF
导出
摘要 数据库服务外包是近几年兴起的一种新的数据库应用模式.外包数据库模型中数据的完整性检测是为了防止外包数据库提供商内部和外部人员对数据库内容篡改,保证查询者获得正确查询结果的一种手段.现有的完整性检测方法都是针对关系型数据库中的结构化数据,对于文本这种非结构化数据目前还没有成型的解决方案.为了完善外包数据库模型中数据完整性检测技术,提出了一种基于数字指纹的文本数据的完整性检测方案,该方案不仅可以检测文本数据的完整性,还可以对被篡改数据的位置进行精确定位;提出了两种指纹管理方案,对两种方案的安全性进行了分析;最后通过理论分析和实验验证了该文本数据完整性检测方案的准确性和有效性. In recent years the database service outsourcing is a database application pattern which emerges recently.In the outsourced database model the data integrity detection is a method which prevent the interior personnel in the outsourcing database provider and the exterior personnel to tamper with the data,and guaranteed that the inquiriers obtain the correct inquiry result.The existing data integrity detection method is aiming at the structured data in the relations database,while as for non-structurization there is not a prototyping solution at present.For perfecting the data integrity detection technology in the outsourced database model,in this work a text data integrity detection scheme based on the digital fingerprint was proposed,this scheme not only detected out the text data integrity,but also the data which had been tampered with can be located exactly;our work also presented two fingerprint management plans,and analyzed the security of the plans;Finally through theoretical analysis and experiment the accuracy and validity of this text data integrity detection scheme has been verifed.
出处 《小型微型计算机系统》 CSCD 北大核心 2010年第9期1790-1796,共7页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60773100)资助 "十一五"国家科技支撑计划重点项目(2006BA05B02)资助 河北省自然科学基金项目(F2009000475)资助
关键词 外包数据库 文本数据 数据完整性 outsourced database text data data integrity
  • 相关文献

参考文献1

二级参考文献32

  • 1王正飞 王曼 汪卫 等.数据库中加密字符数据的存储与查询[J].计算机研究与发展,2004,41(1):66-71.
  • 2Beimel A, Ishai Y. Information-Theoretic Private Information Retrieval: A Unified Construction: [ECCC Report TR01-015].Feb. 2001
  • 3Chor B, Goldreich O, Kushilevitz E, et. al. Private Information Retrieval. In:Proe. of 36th IEEE Conference on FOCS, 1995
  • 4Marks D G. Inference in MLS Database Systems [J]. IEEE Transaction on Knowledhe and Data Engineering, 1996, 8(1):46-55
  • 5Song Xiaodong D, Wanger D,Perring A. Practical Techniques for Searches on Encrypted Data. In: The IEEE Symp on Security and Privacy, Oakland, California, 2000
  • 6Bertino E,Ooi Beng Chin,Yang Yanjiang,et al. Privacy and Ownership Preserving of Outsourced Medical Data. ICDE, 2005. 521-532
  • 7Mykletun E, Narasimha M, Tsudik G. Authentication and Integrity in Outsourced Databases. In:Proceedings of NDSS 2004, San Diego, California, USA
  • 8Mykletun E,Tsudik G. Incorporating a Secure Coprocessor in the Database-as-a-Service Model. In: IWIA2005 for Future Generation High Performance Processors and Systems, Oahu, Hawaii,USA, Jan. 2005
  • 9Miklau G, Suciu D. Controlling Access to Published Data Using Cryptography. In: VLDB, 2003
  • 10Hacigumus H,Iyer B,Mehrotra S, Providing Database as a Service. In:Proc. of ICDE, 2002

共引文献16

同被引文献24

引证文献4

二级引证文献158

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部