Font Size: a A A

Database Encryption And Identity Authentication Based On Java Implementation

Posted on:2006-12-16Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhangFull Text:PDF
GTID:2178360182977230Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of computer and network technology, the information security, especially the security of military information system, becomes the focus of the information community, which directly influences the nation's safety and the society stability. How to ensure and enhance the security of database system is the hot topic which is expected to be solved urgently.One of the key methods of resolving the secure problem of information might be encryption, decryption and authentication. This paper does some research on how to encrypt database on the B/S architecture, and apply the production to enhance the security of military information system. Firstly, the paper introduces the background of database encryption research and the domestic and international research application situations; Then, introduces the characteristics and requirement of database encryption; Based on the above discussion, we talk about some kinds of database-encrypting methods, and choose the one that plus encryption system over the DBMS as our solution; With that, the paper introduces the Java encryption technique; Finally, we put forward a secure database encrypting model SDSBJ (the Security Database System Based on Java) on B/S architecture, and implement the software by the B/S structure on Windows platform, employing the technique of standard Java programming language, HTTPS protocol, JSP, java bean, java servlet and SSL.The main contribution of the paper includes:①Provides a full solution of database encryption.②Adopts the authorization mechanism to control the connecting of Clients to the Server and combines the customer certificate and role based accessing control mechanism to enhance the data security, as a result ,it simplify the purview management.③Employs personal certificate and three-lever privacy key management to implement the certificate signature with java technique.④Puts forward the way of database encryption, the encrypting contents is sensitive data, the encrypting granularity is segment.⑤Realizes DES and RSA arithmetic in the design of the system to implement the...
Keywords/Search Tags:Database, Encryption Technology, Public Key, Digital Certificate, Authentication SSL, Triple DES, RSA, PKI JAVA, HTTPS, Encryption Dictionary
PDF Full Text Request
Related items