Font Size: a A A

The Design And Implementation Of Encrypted Database System

Posted on:2007-08-20Degree:MasterType:Thesis
Country:ChinaCandidate:Y QiuFull Text:PDF
GTID:2178360185994105Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Nowadays there are more and more attentions paid to the security of storage of myriads of data in the computer information system, counter-theft of sensitive data and counter-distortion of data, and so on. As the core of the computer information system, database system plays a key role in the protection of the information system.As the head of the project and being in charge of encrypting an information system database, I finish the general design and the concrete design of the system, and work as a guide to implement part of the project. This paper is based on the experience of implementing the project.First, the demand of the project is analyzed. Then according to the analysis the concrete design is fulfilled. The designed client/server system plug-in components are based on the code database, and can be uploaded to the code database management system. This step can ensure that data in the database be encrypted, and be transmitted in code through web, and encryption and decryption of data be finished at the client port, so that the privacy, security and completeness can be achieved. The system includes three modules: the client agent module, the server agent module, and the communication module. The client agent module and the server agent module are plugs-in between the database management system and the web interface. The client agent module receives the function from the interface of the database through the application, and transmits it to the server agent, and then receives the implementation result from the server agent, finally returns to the application. This kind of plug-in system can meet the demand of storing encrypted data in the database and transmitting data privately and completely.The system is used in a database, which effectively ensures the security of the core data, and plays an important role in the security and prevention system.
Keywords/Search Tags:database, plug-in, confidentiality, encryption, crypto-text
PDF Full Text Request
Related items