Font Size: a A A

The Research Of The Encrpytion Technology In The Database Based On J2EE Architecture

Posted on:2009-07-05Degree:MasterType:Thesis
Country:ChinaCandidate:L XuFull Text:PDF
GTID:2178360245971836Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The databases in the computer system store abundant information and contain a lot of sensitive data. However, it seems that people always pay attention to the security of data transmission, but ignore the security in the local storage. In order to avoid to be attracted, the efficient method is to encrypt the database. The application system of Web based on the framework of J2EE is proposed in this paper, which integrates the management system of supplying chain used in the company of MeiLing. There is no a completedly united scheme and a feasible standard on the encrpytion of databases. Thus, the designed scheme designed in this paper not only adapts the system itself, but also supplies a scheme of referrence for the other encryption systems with the same frameworks.Firstly, the challenges for the databases are analyzed and classified elaborately and the measures for each type of attractors are designed in this paper. A tool for the description of the potential dangers in the systems - a threaten modle is introduced, which is advantage for the developors of system to know clearly what the encrpyed system should do. In addtion, some necessary algorithms of encryption used in the encrpyted systems for databases are described, which are composed of the algorithms of symmetrical encryption, the algorithms of antisymmetrical encyption and the algorithms of hash encryption. Secondly, some problems are analyzed, such as, the problem of hierarchy localization and the one of encryption gradularity, which would need to be solved. Thirdly, some basic demands on the encryption of databases are proposed, including the retionalization of data processing, no effection of operation for the legal users and the acceptable reaction-time and so on.The completed scheme of encryption is given in the main content of paper, comprising seven parts as follows: Key Vault,Key Manifest,Protected Data,Cryptographic Engine,Key Manager,Cryptographic Provider. The threaten model of system is established, which is integrated the actural circumstances from the system of supplying chain in the company of MeiLing. At the same time, some concrete implement methods of the critical parts in the encryption system are described. Besides, the security on the system of encryption is tested in three sides, separately containing the access control, the data of encryption and the tests of the according time. The testiing experiments show that the encrypted system could encrypt and decrypt the normal data, control the authority of access for all kinds of users strictly, protect the sensitive data in the databases efficiently and perform better on the reaction time of system.Finally, the last part of paper makes a conclusion of all the work, inducts some weaknesses and discusses the future work.
Keywords/Search Tags:the encryption of databases, the algorithm of encryption, the threaten model, J2EE
PDF Full Text Request
Related items