[1]汪海伟,杨庚,刘国秀,等. 可搜索数据库加密系统的设计与实现[J].计算机技术与发展,2017,27(08):130-134.
 WANG Hai-wei,YANG Geng,LIU Guo-xiu,et al. Design and Implementation of Searchable Database Encryption System[J].,2017,27(08):130-134.
点击复制

 可搜索数据库加密系统的设计与实现()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年08期
页码:
130-134
栏目:
安全与防范
出版日期:
2017-08-10

文章信息/Info

Title:
 Design and Implementation of Searchable Database Encryption System
文章编号:
1673-629X(2017)08-0130-05
作者:
 汪海伟杨庚刘国秀曾橙焜
 南京邮电大学 计算机学院
Author(s):
 WANG Hai-weiYANG GengLIU Guo-xiuZENG Cheng-kun
关键词:
 SQL查询密文查询可搜索数据库加密隐私保护
Keywords:
 SQL queryciphertext querysearchable database encryptiondata privacy-preserving
分类号:
TP302
文献标志码:
A
摘要:
 数据隐私保护已成为网络应用中急需解决的问题,其简单的解决方案是将隐私数据进行加密后存储在数据库中,但该方式存在一些缺陷,包括经加密后的明文数据会失去明文的一些属性,如数据之间的顺序关系,原有对明文的运算也无法在密文上执行,需将所有密文解密为明文才能完成操作,因而在面对大规模的数据库存储需求时,其执行效率远低于明文数据库.为在保证安全性的同时解决密文上不可直接执行SQL操作的问题,设计高效、安全的加密模型已成为当务之急.为此,设计并实现了一种包括SQL语句改写、明文数据加密和查询处理等功能在内的可搜索数据库加密系统.该系统在语句执行过程中通过动态调整加密层,实现了在密文上直接执行复杂的SQL语句,避免了不可信数据库服务器暴露明文数据,保护了数据隐私.实验结果表明,所构建的系统具有较好的有效性和安全性.
Abstract:
 Data privacy protection has become an urgent problem in network applications.The alternative solution is to store the private data in the database after encryption.However,there are some defects in this approach,including the loss of some attributes of plaintext after encrypted data,such as the order of the data.The original operation on the plaintext cannot be implemented in the ciphertext,and all the ciphertext need to be decrypted.Therefore,the efficiency is less than the plaintext database in the face of large-scale database storage.In order to solve the problem that the SQL operation cannot be executed on the ciphertext directly while ensuring the security,it is urgent to design an efficient and secure encryption model.A searchable database encryption system including functions of SQL statement rewriting,plaintext data encryption and query processing is proposed.The system implements dynamic encryption in the process of statement execution,complex SQL statements to be executed on ciphertext,to avoid exposing plaintext by the untrusted database server which can protect the data privacy.The experimental results show that the system has better effectiveness and safety.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(08):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(08):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(08):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(08):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(08):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(08):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(08):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(08):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(08):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(08):47.

更新日期/Last Update: 2017-09-21