Font Size: a A A

Research On Integrity Auditing Based On Shared Database Outsourcing

Posted on:2012-12-21Degree:MasterType:Thesis
Country:ChinaCandidate:C CaiFull Text:PDF
GTID:2218330362456502Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development of the network technology, it's easy to achieve remote access to database. There are many security risks during remote accessing to the database, because the network environment is not credible. Destruction of user data integrity is one of the typical problems.Data integrity verification is a key to solve the safety of remote access to the database.The architecture of the integrity verification system is designed to verify the integrity of data. The verification system is composed of four modules: the data decomposition module, the query translation module, the data synthesis module and the integrity verification module. To ensure the data privacy on remote servers, data decomposition methods and data synthesis methods are provided, which can be applied to numeric and string types of data. Preserve privacy is achieved by data decomposition and restore data is achieved by data synthesis.For numeric types of data and string types of data, respectively, a security coefficient generation method is designed, so there is certain relationship between the coefficient and the data, to ensure the smooth progress of the data integrity verification. In this paper, most types of query transformation algorithms are availble, including the equivalent queries, range queries, fuzzy queries, queries with aggregate functions, nested queries and join queries, which make integrity verification system can do integrity verification on all types of query return result set. The process of integrity verification is given, which determines whether the data is destructed by judging whether the relationship between the coefficient and data has been maintained.The experimental results show that the integrity verification system can detect various acts of destruction of data integrity, and the whole system is less affected after adding the integrity verification module.
Keywords/Search Tags:h Integrity verification, data decomposition, data synthesis
PDF Full Text Request
Related items