Font Size: a A A

Research On The Security Technology Of Web Database In A Mobile Computing Environment

Posted on:2012-02-07Degree:MasterType:Thesis
Country:ChinaCandidate:H W CaoFull Text:PDF
GTID:2178330335968700Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
As the rapid development of wireless communication technology and mobile technology, more and more people enjoy accessing to Internet information through mobile devices. In this new mobile environment, We can publish or collect data information by using the Internet at any time and place, or even obtain dynamic data information that changes constantly because of position shifting。A large number of information resources have been stored in database and become an important aspect of information security. The secure database has been widely applied in government, military, oil, finance and other business areas. How to ensure database security in mobile computing environment, has become a hot topic of current research, but current research in this area is not much.In the mobile environment, information is transmitted open through the wireless channel. Any person who has the device with a certain frequency can obtain the the content through wireless channel transmission, so the user's information is more likely to be stolen. This paper introduces database security in the mobile environment, Web database security refers to ensure the integrity, confidentiality and availability of data information in the database. Technology was researched to protect database security, such as:access control, database audit, database encryption, database backup and recovery, some database encryption algorithms used frequently was descripted in detail, the characteristics of these algorithms were compared and analyzed. Then the principles and ways of database encryption and likely problems were researched.Finally the system operating environment was built, simulation experiments was test.According as mobile devices in the mobile environment has relatively low operating efficiency, DES encryption algorithm has the features of little computation and fast operation, DES algorithm was choosed to encrypt the sensitive field of the system. Encrypted data was stored in cipher text, even if the illegal access, confidential data will not be obtained by opponents, because what they get is almost impossible to crack the password. Through combining all kinds of security technology, applied in a practical hotel management system, the security of data in the system is protected.
Keywords/Search Tags:Mobile Computing, Web Database, Information Security, Data Encryption
PDF Full Text Request
Related items