Font Size: a A A

Research And Application Of Embedded Database Base On ARM-Linux

Posted on:2016-09-23Degree:MasterType:Thesis
Country:ChinaCandidate:S F DuFull Text:PDF
GTID:2308330473955266Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the popularity of mobile terminals in our life, Including education, entertainment, industry and other fields. People have been thinking about it, initially, People want enterprise-database for the purpose of processing large amounts of data to be used directly embedded devices, however, because their resources are extremely limited. So this idea had to be abandoned, only use embedded database design. Thus, Composite with idea that staff in database research and development and experts in embedded system development; Recommend to use lightweight database based on the embedded system; embedded database has been developing smoothly from emergence until now. Because their resources very limited, they will have to face a lot of data operations in this case; How to effectively manage so much data; How can guarantee their safety; How can guarantee their reliability; It is based on objective reasons; Safety studies on it is an important issue.Content referred to in this paper are based on the actual project and needs and development; In this paper, we implemented an embedded database to meet the needs of project; At the same time we studied security about it, Analysis advantages and disadvantages in the traditional encryption algorithms; Then propose an improved encryption policy. This paper focuses on achieving elaborate database design process and encrypts, these are closely linked to the project needs.In this paper, we first introduce the knowledge of embedded systems and databases, and then describes some of the mechanisms, working Principle database, Implementation process of the database. In this latter, we made some simple and common operations on this database. For security and Performance in using this database, we Researched, Proposed and designed this encryption policy; ultimately implemented on this system. In this process, we also described some of the common encryption methods; Finally We introduced the work to build the test platform, Encryption capabilities were tested on functionality and performance, So as to achieve the functionality has been verified.
Keywords/Search Tags:embedded database, database encryption, operating system
PDF Full Text Request
Related items