Font Size: a A A

Research Of Database Encryption Subsystem

Posted on:2007-12-20Degree:MasterType:Thesis
Country:ChinaCandidate:F H CengFull Text:PDF
GTID:2178360212966473Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Nowadays, as the development of science and technology, the requirement of information communication and sharing are increasing. Such communication and sharing has been greatly improving our live, and also activating the development of commerce. While on the other hand, the information security has become a big problem, which would have greater and greater impact on the people who are used to information live. Currently, most activities of storing and accessing information resource are accomplished via database system, which is the core of information system. So database system security is an important and necessary job. Many technologies have been developed to keep database system's safety. One of them is database encryption, which is effective for practical use.In this paper, we first give an introduction on database system and encrypt algorithm, we then talk about the key technologies on database encrypt, including their methodology and encrypt layer, and give an integrated database encrypt model.In our model, we use outer-layer encrypt, which inserts an encrypt engine between application and database system. This model guarantees the transparency of encrypted data to the application. In-field encrypt granularity makes the implementation simple but flexibleAccording to the properties of database system, we choose AES as the encrypt algorithm, which is fast, robust, and uses public key algorithm RSA for private key managementSecret key management is one of the core technologies for database encrypt. As the requirement of practical application, we implement dynamic secret key management using multi-layer private key management strategyAs a convenience for database administration, we also provide a program for encrypt tool management.
Keywords/Search Tags:Database, Cipher, Encrypt, Secret Key Management
PDF Full Text Request
Related items