Font Size: a A A

The Research And Design Of The Security Database Based On PKI And PMI

Posted on:2012-11-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y YangFull Text:PDF
GTID:2178330335460808Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the rapid development of computer technology, the range of the database applications system is become more and more widely.80% of the organs, enterprises and institutions are based on their actual need to use a database application system. At the same time, database security issues are also increasingly serious. In 2010, Oracle Corporation released a comprehensive report on database security, which reported that there are two-thirds of the sensitive and controlled data stored in the database. These data once exposed, will give businesses and individuals to bring an immeasurable loss. Therefore, how to effectively guarantee the security of database systems, data confidentiality, integrity and effectiveness, has become one of the important issues for the industry to explore and research.For the existing database security risks of the MIS network management system, we propose a solution that put forward the PKI and PMI technology into the secure database system by comparing the various risks of the solution. The solution uses the digital certificates of PKI to authentication and generate the data encryption keys for the secure storage, and uses the attribute certificate which issued by the PMI to validate and control the user's access permissions, and through the third-party Trust Center to verify the user's permissions, and isolated the authentication with the database system itself, in order to avoid excessive database system administrator privileges as well as ensure the security of the database systems from the perspective of the access control. In this paper, Based on the analysis of the PKI/PMI based on security technology, we design a complete security database system based on the PKI and PMI, research and design each module of the system in detail. Finally, we analyze and evaluate the safety of the system, and proposed the problems of the security database system which need to be study and solve in next step of this paper.
Keywords/Search Tags:Database Encryption, Authentication, Access Control, PKI/PMI, Attribute Certificate, Digital Certificate
PDF Full Text Request
Related items