Font Size: a A A

Research On Encrypted Databasebase On Homomorphic Encryption And Fuzzy Query

Posted on:2015-03-28Degree:MasterType:Thesis
Country:ChinaCandidate:L XuFull Text:PDF
GTID:2308330452455884Subject:Information security
Abstract/Summary:PDF Full Text Request
As a powerful and convenient information carrier, database has been used forenterprise information management by the majority of enterprises and units. However, fora master carrier of information across the enterprise, its security is absolutely essential.There are many existing security measures of database. But despite so many securitymeasures provided by database, information theft has happened once and once again.Encypted database can solve this problem easily.Database stored in ciphertext destroys the original plaintext partial order, and thus cannot index. Further more, its efficiency is badly affected, the indexing process whichrequires multiple encryption and decryption. Introduce three methods of databaseencryption and give some modification to the the database encryption technology based onthe records, so that it can be decrypted for by items.Secret homomorphic filtering algorithm is a major role in the case of the ciphertextdata operation. This paper will analyze the implementation process as well as thelimita-tions of Secret homomorphic filtering algorithm. On this basis, this paper willexpanded the algorithm in real number, including modular arithmetic, addition andsubtraction and multiplication and division.Solve problems in retrieving the ciphertextdatabase. On the basis of the ciphertext, we propose a new method of rebuilding the index,and do fuzzy query on encrypted database based on the newly created index. Give adetailed process of indexing and retrieval processes. Give the feasibility analysis andquery efficiency of the method theoretically and practically.Comprehensive Secrethomomorphic filtering algorithm and the method of building index on ciphertext database,design the Overall framework of ciphertext database. And take a test and evaluation interms of safety and efficiency.
Keywords/Search Tags:retrieved in ciphertext, fuzzy query, secret homomorphic, feasibility
PDF Full Text Request
Related items