Font Size: a A A

Based Network Applications, Database Encryption System Design And Implementation

Posted on:2011-04-06Degree:MasterType:Thesis
Country:ChinaCandidate:X D WangFull Text:PDF
GTID:2208360308466448Subject:Software engineering
Abstract/Summary:PDF Full Text Request
From appearance of the Database's technology on 1960s to now, it has been developed and applied rapidly and widely. With the development of computer technology, e-commerce and e-government, especially the Internet, the Database grows a lot of new applied trends based on network. Therefore, which mechanism applied by network service provider can provide the users to produce data, save data and access data and efficiently protect the data's security. These problems are necessary to be researched. The encryption plays more and more important roles for the high sensitive and confidential data in database. And the encryption is one of useful ways to protect the data in database from being stolen during saving and transmitting. Therefore, the encryption can be used in model. But the current database encryption has the following faults: Firstly, the SQL cannot directly be operated on the encrypted data. The conventional method is that the queries are be operated on server after the data be unencrypted. But this way not only adds the server's load but also brings some secure problems on server and transmitting path. Secondly, in order to reduce the server's load, the SQL can be operated after the encrypted data are transmitted from server to client and are unencrypted on client. This way can make the network jam so that there is very low efficiency.As a result, on the basis of network, we work out and deeply research a kind of new method that can directly research or query on encrypted data so that we can effectively protect the data privacy and guarantee efficiency in database. And according to the results of the research, we realize the encryption in a fact model. At the same time, these results can be applied not only to database, but also to the saving encrypted data, accessing encrypted data and confidentiality of other fields, such as the secure protection of logs, the secure protection of e-mail, and so on.
Keywords/Search Tags:Database encryption, B/S model, Database security, SQL, The encryption
PDF Full Text Request
Related items