期刊文献+

改进多项式划分的XML数据库安全服务方案

Security scheme of XML database service using improved polyphonic splitting
下载PDF
导出
摘要 如何为企业和组织提供安全的XML数据库服务是云计算数据服务的重要研究内容。基于秘密共享的思想,提出了一种改进多项式划分的XML数据库安全服务方案——IPSS-XML。该方案在不降低安全性的前提下,通过以较小的数据预处理代价为XML中的每个非叶子节点添加辅助验证数据的方法,克服了已有方案中元素值验证算法效率低的缺点,提高了查询执行效率。 Outsourcing data owner' s data to Database Services Provider (DSP) securely provides XML database service for companies and organizations, which is an important data service form in cloud computing. This paper proposed an improved polyphonic splitting scheme for XML database service ( IPSS-XML). IPSS-XML overcame the drawback of low verifying efficiency in other existing schemes by adding an Assistant Verifying Data (AVD) to each non-leaf node at low cost. The improvement enhances query executing efficiency without breaking the confidentiality constraints.
出处 《计算机应用》 CSCD 北大核心 2013年第6期1637-1641,共5页 journal of Computer Applications
关键词 XML数据库服务 机密性 秘密共享 多项式划分 辅助验证数据 XML database as a service confidentiality secret sharing polynomial splitting assistant verifying data
  • 相关文献

参考文献13

  • 1罗军舟,金嘉晖,宋爱波,东方.云计算:体系架构与关键技术[J].通信学报,2011,32(7):3-21. 被引量:826
  • 2TIM B, JEAN P, EVE M. Extensible markup language(XML) 1.0 ( Fifth Edition) [ EB/OL]. [ 2012-11-20]. http://www, w3. org/TR/ 2008/REC-xml-20081126.
  • 3冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1066
  • 4田秀霞,王晓玲,高明,周傲英.数据库服务——安全与隐私保护[J].软件学报,2010,21(5):991-1006. 被引量:61
  • 5WANG H, LAKS V S L. Efficient secure query evaluation over en- crypted XML databases[ C]//Proceedings of the 32nd International Conference on Very Large Data Bases. New York: ACM, 2006:127 - 138.
  • 6AGRAWAL R, KIERNAN J, SRIKANT R, et al. Order preserving encryption for numeric data[ C]// Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2004:563 -574.
  • 7LING F, WILLEM J. Efficient processing of secured XML metadata [ C]// Proceedings of the OTM 2003 Workshops. Berlin: Verlag, 2003:704 - 717.
  • 8JAMMALAMADAKA R C, MEHROTRA S. Querying encrypted XML documents[ C]//Proceedings of the 10th International Confer- ence on Database Engineering and Applications Symlsium. New York: IEEE, 2006:129 - 136.
  • 9YANG Y, WILFRED N G, HO L L, et al. An efficient approach to support querying secure outsourced XML information[ C]//Proceed- ings of the International Conference on Advanced Information Sys- tems Engineering. Berlin: Verlag, 2006:157 -171.
  • 10SCHREFL M, GRUN K, DORN J. SemCrypt: Ensuring privacy of electronic documents through semantic-based encrypted query pro- cessing[ C]//Proceedings of the 21 st International Conference on Data Engineering Workshops. New York: IEEE, 2005: 1191.

二级参考文献165

  • 1孔令波,唐世渭,杨冬青,王腾蛟,高军.XML数据的查询技术[J].软件学报,2007,18(6):1400-1418. 被引量:72
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Hacigümüs H,Mehrotra S,Iyer B.Providing database as a service.In:Proc.of the Int'l Conf.on Data Engineering.Washington:IEEE Computer Society Press,2002.29-38.
  • 4Mykletun E,Narasimha M,Tsudik G.Authentication and integrity in outsourced databases.ACM Trans.on Storage,2006,2(2):107-138.
  • 5Schneier B,Wrote; Wu SZ,Zhu SX,Zhang WZ,Trans.Applied Cryptography-Protocols,Algorithms,and Source Code in C (Second Edition).Beijing:China Machine Press,2006 (in Chinese).
  • 6Shmueli E,Waisenberg R,Elovici Y,Gudes E.Designing secure indexes for encrypted databases.In:Proc.of the IFIP Conf.on Database and Applications Security.LNCS 3654,Heidelberg,Berlin:Springer-Verlag,2005.54-68.
  • 7Yang ZQ,Zhong S,Wright RN.Privacy-Preserving queries on encrypted data.In:Proc.of the 11th European Symp.on Research in Computer Security.LNCS 4189,Heidelberg,Berlin:Springer-Verlag,2006.479-495.
  • 8Davida GI,Wells DL,Kam JB.A database encryption system with subkeys.ACM Trans.on Database Systems,1981,6(2):312-328.[doi:10.1145/319566.319580].
  • 9Song DX,Wagner D,Perrig A.Practical techniques for searches on encrypted data.In:Proc.of 2000 IEEE Symp.on Research in Security and Privacy.Washington:IEEE Computer Society Press,2000.44-55.
  • 10Hacigümüs H,Iyer B,Mehrotra S,Li C.Executing SQL over encrypted data in the database service provider model.In:Proc.of the ACM SIGMOD Conf.New York:ACM Press,2002.216-227.

共引文献1890

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部