Font Size: a A A

The Research And Implementation Of Database Encryption System Based On B/S Architecture

Posted on:2004-03-15Degree:MasterType:Thesis
Country:ChinaCandidate:N LiuFull Text:PDF
GTID:2168360095953224Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Computer security now has been the focus of information community. Therefore, how to assure and enhance the security of database has been the hot topic which is expected to be solved urgently.The key technology dealing with information security is encryption, decryption and authentication.This paper introduces and deeply researches the basic theory and application of symmetrical and asymmetrical cryptography.In order to solve the database encryption, this paper also puts forward a scheme named Security Database System (SDS), whose core is CA authentication and Information encryption.Specifically, the contribution of this paper includes: 1. Provides the full solution of database encryption on any database system.Theencryption of database is performed in the way that plus the encryption systemover the DBMS, sensitive data is encrypted in the unit of segmen.The way ofdatabase encryption is feasible and can be used for reference. 2. Adopts the CA authentication mode, and combines the user certificate and RoleBased Access Control, which enhances authentication and simplifies the way ofaccess control. 3 Brings forward the ways of the user certificate management and two-layerprivacy key's management, which ensures the reality and credibility of theprivacy key and realizes the dynamic management of the privacy key. 4 Realizes the data encryption by triple DES arithmetic and RSA arithmetic in theDesign and Implementation, which ensures the intensity of encryption. 5 Transfers the data over the SSL links, which ensures the secrecy in datatransmission.6 Applies the figure watermark on the important data, which realizes the integrityof data. 7 The SDS, which is built on the three-tier brower/server mode, has the propertiessuch as high effiency, easy to maintain, security etc.
Keywords/Search Tags:Database, Encryption, Public Key, PKI, CA, Digital Certificate, Authentication, Information Security, Digital Watermark, SSL, Triple DES, RSA
PDF Full Text Request
Related items