期刊文献+

移动终端网络可生存数据库安全防篡改仿真 被引量:4

MobileTerminal Network Survivable Database Security Anti-Tampering Simulation
下载PDF
导出
摘要 采用当前方法对可生存数据库进行安全保护时,存在对数据加密所用的时间较长、数据在数据库中的可用度较低、加密效率低和有效性差的问题,为此提出移动终端网络可生存数据库安全防篡改方法。在流控思想的基础上计算用户在可生存数据库中的可信度,通过令牌漏桶算法对用户请求进行排序,降低请求队列在数据库中的拥塞程度,在请求队列排序和用户可信度的基础上确定数据库中请求的转发总数,通过可信度管理、队列管理和请求转发管理构成可生存数据库的第一道防线。在集中式认证机制的基础上引入时间戳动态因子,采用混合动态数据加密算法对数据库中的数据进行加密,实现移动终端网络可生存数据库的安全防篡改保护。仿真结果表明,所提方法的加密效率高、有效性好。 This article proposed an anti-tampering method for the security of survivable database in mobile termi-nal network.Firstly,we calculated the credibility of user in survivable database based on the flow control idea.Sec-ondly,we sorted the user request through the token bucket algorithm,and thus to reduce the congestion level of re-quest queue in database.Thirdly,we determined the total number of forwarding requests in database based on the re-quest queue order and user credibility.Then we used credibility management,queue management,and request for-warding management to constitute the first line of defense for the survivable database.Based on the centralized au-thentication mechanism,we introduced the timestamp dynamic factor and used the mixed dynamic data encryption al-gorithm to encrypt the data in database.Finally,we achieved the tamper protection of the survivable database in mo-bile terminal network.Simulation results show that the proposed method has high encryption efficiency and good valid-ity.
作者 姚琨 李伶俐 YAO Kun;LI Ling-li(Manzhouli College Of Inner Mongolia University,Manzhouli Inner Mongolia 021400,China)
出处 《计算机仿真》 北大核心 2020年第1期456-459,483,共5页 Computer Simulation
关键词 移动终端 可生存数据库 防篡改 Mobile terminal Survivable database Tamper-resistant
  • 相关文献

参考文献10

二级参考文献56

  • 1陈兰香,许力.云存储服务中可证明数据持有及恢复技术研究[J].计算机研究与发展,2012,49(S1):19-25. 被引量:28
  • 2张相锋,孙玉芳.Biba模型中严格完整性政策的动态实施[J].计算机研究与发展,2005,42(5):746-754. 被引量:15
  • 3DWORK C. Differential privacy in new setting[ C]// SODA 2010: Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms. Philadelphia, PA, USA: Society for Industrial and Applied Mathematics, 2010:174 - 183.
  • 4DWORK C. The promise of differential privacy: a tutorial on algo- rithmic techniques[ C]//Proceedings of the 2011 IEEE 52nd Annu- al Symposium on Foundations of Computer Science. Piscataway, NJ: IEEE, 2011:1 -2.
  • 5付艳艳,付浩,谢幸,等.社交网络匿名与隐私保护[J].中国计算机学会通讯,2014(6):51-58.
  • 6BLUM A, DWORK C, McSHERRY F, et al. Practical privacy: the SuLQ framework[ C]// PODS 2005: Proceedings of the Twen- ty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Princi- ples of Database Systems. New York: ACM, 2005:128 - 138.
  • 7CLIFTON C, KANTARCIOGLU M, VAIDYA J, et al. Tools for privacy preserving distributed data mining[ J]. ACM SIGKDD Ex- plorations Newsletter, 2002, 4(2):28-34.
  • 8DOMINGO-FERRER J. Microaggregatlon or database and location privacy[ C]// NGITS 2006: Proceedings of the 6th International Conference on Next Generation information Technologies and Sys- tems, LNCS 4032. Piscataway, NJ: IEEE, 2006: 106- 116.
  • 9周水庚,李丰,陶宇飞,肖小奎.面向数据库应用的隐私保护研究综述[J].计算机学报,2009,32(5):847-861. 被引量:221
  • 10魏立峰,孟凯凯,何连跃.面向用户角色的细粒度自主访问控制机制[J].计算机应用,2009,29(10):2809-2811. 被引量:7

共引文献84

同被引文献72

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部