Font Size: a A A

Security Of Embedded Database Sqlite

Posted on:2011-02-17Degree:MasterType:Thesis
Country:ChinaCandidate:L LiuFull Text:PDF
GTID:2208330332976878Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the era of mobile computing, embedded operating system's demanding for database technology opened up new room for development. With the popularity of smart mobile devices, embedded database technology is now gradually moving from the research field towards a wide range of applications. Embedded database technology with a variety of intelligent devices has been the close integration, which is being attentioned academic, industrial, military and civilian sector in areas. So how to protect the security of an embedded database system has become an urgent solution.Current common embedded database system is Berkeley DB, SQLite, etc. Berkeley DB is an industrial-strength embedded database system. Which has highly efficient of data processing. However, Berkeley DB is not a relational database, does not support SQL language, does not provide database's common advanced features, such as stored procedures, triggers and so on. SQLite is not only an open source embedded database,But also has a small costs, and high efficiency characteristics.Kunming Science and Technology Board "microkernel-based modular memory embedded database management system" is this paper's the background. Innovations of this article is realized on the embedded SQLite database security research by the database security policy studies. This paper's main task is to:1. Implementation the encryption of Sqlite.By encryption, the database's storing contents is a ciphertext. Which reduce theft or loss due to storage media'losses.2. Implementation of the embedded database SQLite's user authentication feature.The user authentication mechanisms are used to test the legality of user identity. Thus avoiding unauthorized users's access.3. Implementation of role-based right control permissions on the SQLite.role-based right control is to ensure that users can only be carried out the SQLite through authorized the operation. Thus avoiding the user's ultra vires action.4. Increase the backup functions and restore functions on SQLite. Database system's backup and recovery technology play an important role to the safety and reliability of the system, after increasing the backup and restore functions and improve the system's operating efficiency.
Keywords/Search Tags:database security, encryption, user authentication, rights control
PDF Full Text Request
Related items