期刊文献+

外包数据库中数据加密的设计和实现 被引量:8

Design and implementation of encrypted data in outsourced database
下载PDF
导出
摘要 加密技术是保护外包数据库中数据安全的一种有效方法,但如何对加密数据进行高效查询是一个热点,引起了研究界的重视。针对这个问题,提出了一种基于DBMS内核的加密模式,通过安全字典和SQL语句的扩展,实现数据的加密存储和高效查询。实验证明了该方法的有效性和可行性。 Encryption technology has become an important mechanism of securing data stored in the outsourced database.However,it is a difficulty to query efficiently the encrypted data and many researchers take it into consideration.To solve the problem,an encrypted schema,based on the inner DBMS,is proposed.Through the security dictionary and the extended SQL,the approach implements the encrypted storage and efficient query over the data in the outsourced databases.Results of experiments validate the efficiency and feasibility of the approach.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第28期141-145,共5页 Computer Engineering and Applications
基金 湖南省自然科学基金 湖南省社会科学基金No.09YBB231) 湖南省教育厅科研项目No.07C400~~
关键词 外包数据库 数据安全 数据加密 outsourced database database security encrypted data
  • 相关文献

参考文献15

  • 1Bertino E, Sandhu R.Database security concepts approaches and challenges[J].IEEE Transactions on Dependable and Secure Computing,2005,2( 1 ) :2-19.
  • 2Gabriel G,Panos K,Khoshgozaran A,et al.Private queries in location based services:Anonymizers are not necessary[C]//Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data.Vancouver: ACM Press, 2008 : 121-132.
  • 3Ateniese G,Kevin F,Matthew G,et al.lmproved proxy re-encryption schemes with applications to secure distributed storage[J]. ACM Transactions on Information and System Security, 2006,9 (4) : 1-30.
  • 4朱勤,于守健,乐嘉锦,骆轶姝.外包数据库系统安全机制研究[J].计算机科学,2007,34(2):152-156. 被引量:17
  • 5Ahitub N, Lapid C, Neumann S.Processing encrypted data[J]. Communications of the ACM, 1987,30(99) :777-780.
  • 6Hacigumus H, Lyer B, Mehrotra S.Providing database as a service[C]//Proceedings of the ICDE.San Jose: IEEE Press, 2002: 29-38.
  • 7Hacigumus H,Lyer B,Li Cben,et al.Executing SQL over encrypted data in the database server provider model[C]//Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data.Madison Wisconsin : ACM Press, 2002 : 216-227.
  • 8Agrawal R, Kirenan J, Srikant R, et al.Order-preserving encryption for numeric data[C]//Proceedings of the ACM SIGMOD international Conference on Management of Data.Paris:ACM Press, 2004 : 563-574.
  • 9Bouganim L, Pucheral EChip-secured data access: Confidential data on untrusted servers[C]//Proceedings of 28th International Conference on Very Large Databases.Hong Kong:ACM Press, 2002: 131-142.
  • 10Song D X, Wagner D, Perring A.Practical techniques for searches on encrypted data[C]//IEEE Symposium on Security and Privacy, 2000 : 44-55.

二级参考文献69

  • 1Lyer B,Mehrotra S,Mykletun E,et al.A framework for efficient storage security in RDBMS[C]//LNCS 2992:the Proc of the 9th International Conference on Extending Database Technology(EDBT),2004: 147-164.
  • 2Hacigumus H,Lyer B,Mehrotra S.Providing database as a service[C]// Proc of ICDE 2002,2002:29-38.
  • 3Chen Y,Chu W W.Database security protection via inference detection[C]//IEEE International Conference on Intelligence and Security Informatics,May 2006.
  • 4Sesay S,Yang Zong-kai,Chen Jing-wen,et al.A secure database encryption scheme[C]//Consumer Communications and Networking Conference,Jan 2005:49-53.
  • 5Beaver K.Encryption enhancements in SQL Server 2005.Microsoft SQL Server,June 2006.
  • 6Bebek G.Anti-tamper database research:inference control techniques, EECS433 final report[R].Case Western Reserve University,2002.
  • 7Hacigumus H,Lyer B,Li C,et al.Executing SQL over encrypted data in the database-server-provider model[C]//Proc of ACM SIGMOD,2002:216-227.
  • 8Hore B,Mehrotra S,Tsudik G.A privacy-preserving index for range queries[C]//Proc of 30th International Conference on Very Large Databases, Toronto, Canada, 2004: 720-731.
  • 9Agrawal R, Kirenan J, Srikant R,et al.Order-preserving encryption for numeric data[C]//Proc of the ACM SIGMOD,Paris,France,2004: 563-574.
  • 10Bouganim L,Pucheral P.Chip-secured data access:confidential data on untrusted servers[C]//Proc of 28th International Conference on Very Large Databases, Hong Kong, China, 2002 : 131-142.

共引文献26

同被引文献62

引证文献8

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部