This paper mainly studies the encryption method of the database secure policy, how to combine the cryptography with the relational database to protect sensible data, Prove the feasibility of the field encryption. Along with the method above and multi-data-key idea, design a symmetrical algorithms to enable authorized users share access to the confidential information, and protect the data key encrypted by user private key. Then according to the life cycle of key systems on time and the replacement of the keys to achieve better security results.Through the use of cryptographic engine, key vault, key manifest, key manager, cryptographic provider, cryptographic consumer and the protected data and between the seven components of the encryption system architecture, which can be verified to be secure, feasible and easy-to-use by comparing it with other encryption schemes. Then design a model to implement the feasibility and validity of the integrated encryption scheme and security dictionary.At last, discuss some problems of database security in our future research. |