Font Size: a A A

Mobile Database Model Based On Secret Sharing Protocol

Posted on:2016-06-01Degree:MasterType:Thesis
Country:ChinaCandidate:J RanFull Text:PDF
GTID:2308330461451322Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the improvement of wireless communication technology, mobile computing technology and the rapid development of mobile Internet and smart mobile client’s popularization, people can obtain abundant information on the Internet anytime and anywhere. People are increasingly eager to obtain the required information without limited by time and place, and more and more dependent on mobile client to convenience of their life.However,we can be seen from media reports, data security is facing severe challenges. The function of the existing mobile database products at home and abroad are not perfect, not form a unified standard. Research on the theory and model also cannot be applied in the commercialization of the mobile database. In this paper, in order to improve the security of mobile data storage, a mobile data storage solution based on secret sharing protocol is proposed, which is based on AES and Shamir(k, n) threshold secret sharing system. The main process of the solution is as follows:(1) Considering the mobile client resources and ability is limited, in the mobile client built-in a lightweight memory database for storing a small amount of basic information, most information especially sensitive data stored on the server.(2) On the data encryption server, the mobile client submit sensitive data which are used AES encryption. Splitting the secret key use Shamir(k, n) threshold secret sharing system. The splitting result will have n shadow key,which and ciphertext will be transmitted to the n data storage server. Each data storage server stores only a shadow key and all the encrypted text.(3) When the mobile clients want to access data, sending the request to the data encryption server, which choose k data storage server arbitrarily, using load balancing algorithm determine a good server for data recovery server from k data storage server.(4) The shadow keys held by the other k-1 data storage servers are sent to the data recovery server. On on the data recovery sever, k shadow keys using Shamir(k, n) threshold secret sharing system based on lagrange interpolation formula restore the secret key, then,decryption cipher. At last, the data recovery sever send the required data to the mobile client.Finally, to the mobile data storage solution based on secret sharing protocol testing experiment, the results show that the proposed solution is feasible, even when a large number of mobile clients concurrent accessing to the data is still applicable. The solution has the practical application prospect.
Keywords/Search Tags:mobile computing, mobile database, secret sharing protocol, advanced encryption algorithm(AES), load balancing, data security
PDF Full Text Request
Related items