Font Size: a A A

Secure Database And Its Application Based On Encrypted Database

Posted on:2009-11-24Degree:DoctorType:Dissertation
Country:ChinaCandidate:C Y YinFull Text:PDF
GTID:1118360248452806Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the technical development of computer, the great important data is processed through computer and saved to storage.The computer suffers the attack of the external world easily. Therefore the safety of database has the higher realistic meaning and theories meanings.The security of database information become the key part of the modern information.The acquired achievements of this dissertation are summarized as follows:A. Study on database systemThis paper Carry on the research to the theories of the database system, analyze its insecurity reason and discuss various solve the method.B. In order to imp rove database security, and to avoid information exposing of access control strategy, data item was used as the encryp ted p rincip le, app lying its p roperty of basic granularity to strengthen the database security. Some solved method was given in the database currently. A new query algorithm was used to acquire imp roved encryp ted data. The p roposed algorithm uses average-value as p rincip le to conceal the clear statement sequence. For field encryp tion, the information exposing was avoided by interference factor. A kind of information exposure of encryp ted database was given in limited value area. The simulation results p roved that the database security ofmodified method is higher than other method, and modified method has shorter response time.C. Encryp ted database are an effective method to realize database security. A quick index is raised in paper [Dai Yiqi, 1997].But there isdeficiency about security and task allocation. Privacy homomorphism is raised to discuss this p roblem in paper [Yang Yong, 2005]. A module based on p rivacy homomorphism is presented, and mathematic method on p rivacy homomorphism is discussed. It is p roved that thismethod is impossible in the range of the real, and a new operation must be defined.D. How to improve secure computing is a important problem in science computing. This paper analyzes dynamic network technique and Web system of Matlab firstly. Then put forward the improvement project of the database for the purpose of the further analysis. It puts a referenced method to how to improve secure computing.E. A Modified Model for Secure Database.In order to improve personal data security in database, and to avoid information exposing of personal privacy, personal data was used as the encrypted principle, applying homomorphism and random perturbation to strengthen personal data security. This paper analyze the usage of personal data in electronic commerce firstly, Then discuss realization security of personal data. In light of this, a new algorithm was used to acquire improved security. The proposed algorithm uses homomorphism as principle to preserve privacy. This method can make the important data to be appeared with secret content in the web service, and prevent personal data from being misused. The simulation results proved that the modified method can protect personal privacy effectively, and can carry on data mining to provide the characteristic service for the customer, and modified method has shorter response time.F. Study on automatic key-generation based on speech technique.Summarily, the dissertation does a great deal of work in the aspect of studying encrypted database theory and applications, while having acquired many achievements of which inject new blood for secure database. Besides, these models will be further enriched and consummated. Our research, from now on, will be focused on compressively studying their theoretical foundations and exploring their applying area.
Keywords/Search Tags:Secure database, Homomorphism, Key-generation, Data mining, Secure Science computing
PDF Full Text Request
Related items