Font Size: a A A

B / S Structure-based Database Encryption

Posted on:2006-04-13Degree:MasterType:Thesis
Country:ChinaCandidate:X S HuangFull Text:PDF
GTID:2208360155469695Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet technology, more and more enterprise and people share the abundant resources on the Internet and exchange data through Internet.The widely used of the Internet has brought many conveniences, but at the same time it also brings many new problems such as the information insecurity. Therefore the research of information system's security has become the significant research field. Because database is the core of an information system, the security of the database will affect the security of information system. Data encryption is the main project of improving the security of information system. And the database encryption has become the important way to improve the security of database.At first the article research on the security of the database and give a summary. And then work on how to implement data encryption in database. In the end, a new database encryption scheme is discussed, and a student score management system based on B/S structure is implemented and the result shows that the idea of the encryption is feasible.In our encryption scheme, the column encryption is adopted which can make it easy to implement the database encryption. The choosing of an encryption algorithm is the main question in database encryption. Besides the security, the robust and the easy-to-use have to be considered. In the choosing of the encryption algorithms, the paper adopts different symmetrical algorithm and asymmetrical algorithm for different encryption objects. The management of encryption-key is the difficult point of database encryption, And it will affect the efficiency and the security of the encryption result. This paper combines the symmetrical and asymmetrical algorithms to design a multi-levels key management schemes. The main idea is that the system provides a KeyPair for every legal user, then the data-key is encrypted by the PublicKey of the KeyPair, and decrypted by the PrivateKey of the KeyPair. At thesame time, the PrivateKey is protected by the user password .By this way, A secure system is constructed.
Keywords/Search Tags:database Encryption, encryption-key management, B/S_architecture, encryption engineer
PDF Full Text Request
Related items