Font Size: a A A

Research Of Privacy Homomorphism Based On Manipulation Of Encrypted Database Information

Posted on:2007-12-23Degree:MasterType:Thesis
Country:ChinaCandidate:M K LiuFull Text:PDF
GTID:2178360185473472Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The database is the heart of the enterprises. It is where your most valuable assets reside, the information is the foundation of the business. The database system as the information carriers of most enterprise and departments, storing and access controlling the information is its duty. On the one hand, the database should provide the safe access service, namely provide reliable data services to authenticated user; On the other hand, in order to insure the availability, confidential, integrity and consistency of data information, the illegal access must be refused. In a long times, the Oracle, Sybase and SQL Server are extensively used in all kinds of enterprises, and it is too hard to change in short time; meanwhile, the shortcoming on security in those produces are fairly facts, for example, the attack to change the value of data. To Protect the data is increasingly important, and increasingly difficult. Most security initiatives defensive strategies are aimed at protecting the peripheral of thenetwork. But these efforts may ignore a crucial vulnerability —— sensitivedata stored on database servers are at risk from attackers who only need to find one way inside the network to access this confidential information. Additionally, peripheral defenses like firewalls cannot protect stored sensitive data from the internal threat —— employees especially database system administrators to access and exploit the data. In any way, the attacks by employees who have access to sensitive information are often even more devastating.To protect the database assets, there are security measures you should take. Encryption can provide stronger security for data at rest, but developing a database encryption strategy must take many factors into consideration. This thesis examines the issues of implementing database encryption and makes recommendations that will develop a strategy that will meet different needs, and focus on how to protect data at rest.The method of accelerating database security by database security middleware (DBSMW) is mentioned in the thesis. To effectively secure the databases using encryption, the Kernel issues is How to manipulate encrypted data information without decrypted them? In the encrypted database system, privacy homomorphism can effectively protect some sensitive and important data through operating on the encrypted-text. Therefore, according to the concrete work, we discussion focuses on the concept, algorithm, program and key-nodes about PHs. The chiefly work as fellow:We summarized the technology of information and database security, and emphatically elaborated that the problem of existence and the research situation of database security now, then bring forward the best solution to it. educing the quarry and significance of our research work with actualized method--PHs.The middleware is the focuses of software technology research recent few years, the thesises or papers on database security middleware are more few , because of the complexity of problems, existing system have not achieved...
Keywords/Search Tags:Information security, Database encryption, Privacy Homomorphism (PHs), Encrypted Database Information, Granularity, Database Security Middleware, Access control
PDF Full Text Request
Related items