Font Size: a A A

Research On Encryption Method Of Database System Based On Content Associated Key Technology

Posted on:2018-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:X F SunFull Text:PDF
GTID:2428330569975113Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Computer technology is developing by leaps and bounds,all aspects of people's life become more dependent on information systems,and the database as the core of the information carrier stores a large amount of data,and more and more data involves sensitive information such as state secrets and so on.To effectively protect data in the database,we must encrypt and then store the data in secret form in the database.Therefore,the research on database encryption technology has great practical significance.The choice of database encryption strategy should not only guarantee the seamless connection with encryption function and database system,and ensure that it will not cause too much of performance impact to normal access to the database system after it is encrypted.Aiming at problems existing in the traditional encryption technology,content associated key encryption technology is put forward which splits the original plaintext into ciphertext and content associated key,encrypting and decrypting the page based on independent table space as a unit.Designing a kind of database encryption system architecture which adds an encryption component in the database inner model layer.At the same time,in order to guarantee the secure storage of the key file,designs a double encryption key system architecture,which stores page key of the same table space into the same secondary key file put together with the database file,and then calls for content associated key algorithm to encrypt the secondary key file,generating the primary key file with a smaller quantity of data.An independent key management server is designed and implemented to manage the primary key file,including access control and key management modules.Only after users are authenticated in the access control module,can they further request the primary key file's uploading and downloading functions of the key management module.According to the results of simulation data which generated by encrypting and decrypting the different size of file using content associated key algorithm and the traditional AES encryption algorithm,simulation experiments show that content associated key algorithm can be applied in the database page encryption,further validating the feasibility and applicability of the database encryption system architecture.
Keywords/Search Tags:Database security, Content associated key, Page encryption, Key server
PDF Full Text Request
Related items