期刊文献+

基于属性加密的计算机数据库安全检测工具的设计与运用 被引量:12

Design and application of computer database security detection tool based on attribute encryption
下载PDF
导出
摘要 提出网络域数据密匙共享和准入机制,创建新型数据库密匙架构。设计了基于数据属性加密的计算机数据库安全检测工具,就数据库数据进行属性加密,重组加密文件关键序列架构,在传统CDM数据线性规划算法的基础上,引入加密文件序列信息,设计TRIE树结构,将数据序列项转换为字母ID,利用存储容器存储数据项,建立Apriority数据序列索引,并生成索引检索数据表,通过数据库扫描,对异常项进行隔离,实现数据库安全检测。仿真实验数据显示,应用上述检测工具,数据库文件误用异常检测率提高了17%,伪装攻击拦截率提高20%,可以肯定有效地提高计算机数据库信息的安全性。 In this paper,we propose a data key sharing and access mechanism in network domain,and create a new database key architecture.A computer database security detection tool based on data attribute encryption is designed.The database data is encrypted by attributes and the key sequence structure of encrypted files is reorganized.On the basis of the traditional CDM data linear programming algorithm,the encrypted file sequence information is introduced,the TRIE tree structure is designed,the data sequence items are converted to letter ID.The storage container is used to store data items,the Apriority data sequence index is established,and index retrieval data tables are generated.Through database scanning,anomaly items are isolated to achieve database security detection.The simulation results show that the application of the above-mentioned detection tools can increase the detection rate of database file misuse by 17%and the interception rate of camouflage attack by 20%.It can be confirmed that this method can effectively improve the security of computer database information.
作者 陈良英 Chen Liangying(Sichuan Vocationl College of Information Technology,Guangyuan 628017,China)
出处 《信息技术与网络安全》 2020年第4期30-35,共6页 Information Technology and Network Security
关键词 新型密匙架构 属性加密 数据库 误用检测 安全检测 new key architecture attribute encryption database misuse detection security detection
  • 相关文献

参考文献8

二级参考文献45

  • 1牛德华,马建峰,马卓,李辰楠,王蕾.基于属性的安全增强云存储访问控制方案[J].通信学报,2013,34(S1):276-284. 被引量:12
  • 2熊忠阳,郑元兵,张玉芳.基于J2EE的高可用性Web集群的设计及实现[J].计算机工程与设计,2006,27(22):4334-4336. 被引量:3
  • 3朱勤,于守健,乐嘉锦,骆轶姝.外包数据库系统安全机制研究[J].计算机科学,2007,34(2):152-156. 被引量:17
  • 4Lin H Y, Tzeng W G. A secure erasure code-based cloud storage system with secure data forwarding[J] . IEEE Trans on Parallel and Distributed Systems, 2012, 23(6):995-1003.
  • 5Sousa P, Bessani A N, Correia M, et al. Highly available intrusion-tolerant services with proactive-reactive recovery[J] . IEEE Trans on Parallel and Distributed Systems, 2010, 21(4):452-465.
  • 6Waters B. Ciphertext-policy attribute-based encryption:an expressive, efficient, and provably secure realization[C] //Proc of the 14th Conference on Practice and Theory in Public Key Cryptography. Berlin:Springer, 2011:53-70.
  • 7Xiong Anping, Gan Qixian, He Xinxin, et al. A searchable encryption of CP-ABE scheme in cloud storage[C] //Proc of the 10th International Computer Conference on Wavelet Active Media Technology and Information Processing. [S. l.] :IEEE Press, 2013:345-349.
  • 8Hsu S T, Yang C C, Hwang M S. A study of public key encryption with keyword search[J] . International Journal of Network Security, 2013, 15(2):71-79.
  • 9Liu Qin, Wang Guojun, Wu Jie. Secure and privacy preserving keyword searching for cloud storage services[J] . Journal of Network and Computer Applications, 2012, 35(3):927-933.
  • 10Lyu Xin, Xu Feng, Petiton S G. Cryptographic cloud storage with public verifiability:ensuring data security of the YML framework[J] . Intelligent Automation & Soft Computing, 2013, 19(2):111-121.

共引文献96

同被引文献76

引证文献12

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部