Font Size: a A A

Encryption Scheme Of Database Field With Security Classification

Posted on:2008-01-24Degree:MasterType:Thesis
Country:ChinaCandidate:J XuFull Text:PDF
GTID:2178360215495632Subject:Computer applications and technology
Abstract/Summary:PDF Full Text Request
With the abroad application of computer technology, the problem of security has attracted our attention while we are enjoying the convenient services brought by computer technology. As the important component of the information systems, database plays the crucial role in more data with different degree of importance and confidentiality.Many applications store security sensitive data in a database. Sensitive data might include credentials used for authentication, or data such as credit card numbers or bank transaction details. To guard against unwanted information disclosure and to protect the data from unauthorized modification, encrypting the data is a good way. There are several different levels of granularity when we want to implement the encryption in a database. For example, one could choose attribute-, record- or even page-level.In this thesis, we describe a simple and efficient to implement encryption of sensitive data in a multilevel database. The encryption relies on the policy, which separate data-items in different levels into different partitions. Here we give a simpler implement, which encrypts the sensitive data at each level with a key unique to that level, whose security is based on elliptic curve discrete logarithm problem. This enables us to store data-items at different level in a database using symmetrical encryption and asymmetrical encryption. Any unauthorized changes to data-items can be detected. Our scheme can not only ensure the security of the information, but also save large numbers of space.The text is divided into five parts. In the first part, the importance of database security was described. The base technology of database security are discussed and compared in second part. A Encryption Scheme of Database. Field with Security Classification ware introduced in three part. Developing procedure of program and performance module to be developed are described in fourth part. Finally, a expectation was introduced in fifth part.
Keywords/Search Tags:Cipher-text database, Symmetrical encryption, Elliptic curve, Classification
PDF Full Text Request
Related items