Font Size: a A A

Research On The Method Of Fast Retrieval Of Encrypted Database Keywords

Posted on:2018-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:J Z XiangFull Text:PDF
GTID:2358330533962061Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of cloud computing,cloud database services have become the main way of remote storage and processing of data.It has the advantages of on-demand payment,on-demand expansion,high availability and storage integration.You can manage,monitor and expanse the data through cloud database service provider.It can also reduce the cost of hardware procurement and operation.Enterprise users are more focused on business development.However,the database data leakage events have occurred frequency.Some even caused a huge bad impact.The attacker can get the user's information through SQL injection or other forms of database attacks.The information security has been severely damaged.Database encryption can effectively protect the data security.When sensitive data has been protected,even if the attacker broke the database,he can not get the original information.So information disclosure problems can be resolved.But when the encrypted data was been stored in the cloud,the problem of searching will be occurred.The traditional keyword search operation is difficult to efficiently execute in the encrypted database or even can not get the search results.In this paper,the fast retrieval of encrypted data stored in the database was studied.A fast retrieval scheme was proposed.The scheme was implemented:First,the procedure intercepts the plaintext search statement that contains the ciphertext field,and it replaces the query with the mapping relation so that the retrieval can be performed in the ciphertext database.Second,the database creates a secure ciphertext index with the Bloom filter.On the one hand,the keyword was changed ciphertext data through the hash function.Hash's one-way and anti-collision improve the mapping data security factor.On the other hand,Bloom filter uses a number of mapping functions to deal with the same keyword.Getting a number of mapping values also ensure the security of the mapping data.By constructing the salt hash mapping function we ensure the high efficiency and balance of the ciphertext index generation.At the same time,Bloom filter misjudgment rate is very low,which can get more accurate ciphertext retrieval data.Last,the database uses a custom function calling algorithm to form a ciphertext index array and ciphertext retrieval array.The algorithm changed the array to string.It stored the string data in the database.The scheme make the algorithm be implemented.The scheme realizes the operation of dealing with the array in database indirect,and it completes the search of encrypted data.
Keywords/Search Tags:cloud database, encrypted data searching, bloom filter, custom function
PDF Full Text Request
Related items