Font Size: a A A

The Relevant Technologic Research Of Database Encryption System

Posted on:2008-12-18Degree:MasterType:Thesis
Country:ChinaCandidate:R ChenFull Text:PDF
GTID:2178360215499340Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Database, as an important part of information system, plays a key role in the whole construction and application of the system and also in the safety protection of information system.Presently, secret research on database is a new topic both at home and abroad, the usually measure adopted is to protect the data during transforming. The method is to add code into data during the process of data-transforming, and then decode when reaching the destination. There are some other traditional measures, such as access control, fire wall and intrusion detection and so on . However, these measures can not solve all those security problems. Because the data in database is kept under specified terms, for the moment, data in most of database are not protected by encrypting form, but by using these outside methods.To solve these problems mentioned above, we can protect data by database encrypting. By database encrypting, and key management and users access control, we can protect the database from destroying .At the same time, combined with safety measures in transforming , we can build a safe platform for important database to effectively protect important data.The paper aims at the research of database encrypting, the emphasis is on the solution of a series of technique problems while database encrypting, including database encryption and decryption engine, data dictionary ,database interconnect and key management. Among which key management and database encryption and decryption engine are most important .We will discuss six important questions during the process of decrypting, only by solving these problems can the engine function efficiently, we also apply control on users'rights in key management, and make some changes in it ,and make password , user key and figures key being combined well together. Finally , I put forward some methods on mediating work of encryption and decryption module and key management.Safety of transforming road and identification system of users are undertaken by another partner. We can build a safe screen for database by combining server and transforming road .In order to check up those methods, we make a imitation system of single machine become realized, in which most functions are possible , so as to prove that our methods are feasible .
Keywords/Search Tags:data security, encryption, decryption, encryption database, database encryption engine, data dictionary, key management, main key, users'right
PDF Full Text Request
Related items