Font Size: a A A

The Design And Realization Of Database Encryption System

Posted on:2015-10-12Degree:MasterType:Thesis
Country:ChinaCandidate:K J WuFull Text:PDF
GTID:2308330473951908Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Today the popularity and development of network technology is rapid, network data security problem is emerge in an endless stream, this is a hitherto unknown challenge to the database security. Network development trend is about to enter the age of cloud computing, data security in the network become a focus of attention, especially in military information network, electronic government network, industrial control network, education network, medical network relates to national security and beneficial to the people’s livelihood data security is particularly important. Our research on data security early, but the research on database security started relatively late, especially foreign blockade of long-term implementation of China’s basic components, core software, protocol standard and other key technologies, the security of databases technology Research and development can not fully meet the application requirementsThis paper is aimed at the part of the problem, to realize the data on the open network density culture and ciphertext homomorphic operations as the design goal, the database password system to design a practical, main research contents:(1) Database as the data most vector are based on broad, basic characteristics, the research of database security research status at home and abroad, analysis of database security technology, we know that the significance of database is very important to the network space security;(2) The significance of the study of cryptographic algorithms on database security, focusing on homomorphic encryption algorithm are studied in depth, in the full state encryption algorithm can not meet the practical demand, this can be combined with practical homomorphic encryption scheme with different characteristics, design of a fully homomorphic operations to meet the password combination scheme;(3) Research will be fully homomorphic operations using the combination design for the password encryption model onion type, applied to the design of database encryption system, the encryption granularity, encryption level, security mechanism, key management to design the database, based on the design goals of the practical needs to realize database network density culture and ciphertext homomorphic operations;(4) Based on thetechniques about database encryption, this paperproposes a onions ofencryption model forexternal databasemanagementsystems(DBMS).It is helpful to the improvement of security of database.
Keywords/Search Tags:DBMS, external DBMS, onions of encryption model
PDF Full Text Request
Related items