Font Size: a A A

Research Of Database Encryption System

Posted on:2007-06-23Degree:MasterType:Thesis
Country:ChinaCandidate:C S FengFull Text:PDF
GTID:2178360185470016Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Nowadays, a majority of information systems store a large number of important data in databases, as renders databases to become the core of these systems. Consequently, security of databases becomes important and urgent. Those data, which are stored in plain text and are even protected by passwords and firewalls and Intrusion Detection Systems, are easily filched, peculated and destroyed. Besides, widely using Internet, mobile communication and notebook computers, too, extremely threaten security of databases. Therefore, security of databases becomes a urgent problem.Among all the techniques and methods protecting data, it is the most practicable to encrypt data and store encrypted data, because even if encrypted data are filched, copied, or peculated, attackers are incapable of understanding these data in that they are incapable of decrypting these data. In order to protecting data by means of encrypting data, it is necessary to set up a database encryption system, because besides encryption, protecting dada also concern many other problems such as key management. This paper just gives a design and implementation scheme of database encryption system in detail.It is based on a domestic typical scheme of design and implementation of database encryption system that this scheme in this paper is proposed. The typical scheme has two serious disadvantages, one of which is that the encryption system based on the scheme can run on a single comptuter, and the other is that it lacks of flexibility and rationality in key management. In view of the first drawback, the system designed in this paper adopts the multi-layer application program framework based on C/S architecture, such architecture enabling the system to run on the unit and also in such distributed architeture as LAN and WAN, as will undoubtedly improve practicability of the encryption system greatly and make it more easy to be popularized. To the second disadvantage, this paper presents a new scheme of key management. In the...
Keywords/Search Tags:encryption, decryption, database encryption engine, secure datum class, user class, wordbook for encryption, key management, the table of user access authorization, the Chinese Remainder Theorem
PDF Full Text Request
Related items