With the development of information technology, the application of Database System becomes more and more popular. Using Database System for data sharing can make people's life more convenient. But it also provides more opportunities to non-legitimate access to the information in the database. The problem of sensitive information protection is increasingly serious.Among various protected methods have been proposed recently for sensitive data, encryption is an effective method to protect data information in database. But on the other hand, the originally same keywords possibly become different encrypted information after the data is encrypted in the database, and the order between the keywords is also destroyed. So the searching algorithm based-on the keywords could not work again. Query on Encrypted Data in the conditions of not decrypting the encrypted data is a very challenging task. In recent years, domestic and foreign scholars conduct a series of research work on this issue, and they make some research achievements. The achievements include: privacy-preserving query scheme based-on symmetric encryption algorithm, privacy-preserving query scheme based-on PKI encryption algorithm and query scheme for the order preserving encryption of ordinal data based-on PHs.Firstly, this paper analyzes the advantages and disadvantages of the existing privacy-preserving query scheme based-on symmetric encryption algorithm, and then designs a privacy-preserving data query scheme based-on symmetric encryption algorithm and Secure Hash Function, in accordance with the principle of Minimum Information Revelation and using the features of Secure Hash Algorithm. This scheme is superior to existing schemes using symmetric encryption algorithm in operational efficiency. Then, according to the principle of Order Preserving Encryption Scheme, the paper designs OPES and range query scheme on the basis of PHs. This scheme determines the end points of the range through the above query scheme, and determines all of the data meeting query conditions in the range according to the retained order. Then the paper implements two-factor authentication access control with USBKey. |