Font Size: a A A

Design And Practice Of Database Encrypted System Based On ABE And Outside Index

Posted on:2013-07-21Degree:MasterType:Thesis
Country:ChinaCandidate:L H RaoFull Text:PDF
GTID:2248330392957883Subject:Information security
Abstract/Summary:PDF Full Text Request
In Recent years,network develop quickly,and information of the whole societyincreased explodedly. Thanks to database,people can deal with information easily. Whileenjoying the convenience of informationization, people also surfer danger of secretinformation revealment. Currently,lots of enterprises and departments directly storeinformation in database without encryption。Once adversary invade the database,they canget secret information easily.Most of practical methods of database encryption are inside encryption,that isencrypting information stared on hard disk。Through it can prevent cankered user gettingdatabase information from hard disk,once adversary get administer priority of database byother ways,the inside encryption would become useless。Meanwhile,people alsoproposed many methods of database outside encryption,But there are lots of disadvantageof outside encryption。such as,encryption making database performance worsen,hard tofuzzing query encrypted information,the problem of keys management and so on.In this article, a method for database outside encryption is proposed, which treatcolumn as the basic encryption unit,and create a reference file for every encrypted columnin order to easily query its datas。Then do secondary encryption on every encryptedcolumn key using cipertext-attituded based encryption for easier management of userpriority。Then an algorithm of creation and predigestion for access tree of authorizedattributes sets is proposed。design and realization of our system is also introduced in theform of modules,and show the process of dealing with7kinds sql sentences on table,which are create alter drop select insert delete and update. In the last, the factors effectedsystem performance is analysised through testing.
Keywords/Search Tags:database encryption, attribute-based, outside reference, column encrypted
PDF Full Text Request
Related items