[1]王茜,朱志祥,史晨昱,等.应用于数据库安全保护的加解密引擎系统[J].计算机技术与发展,2014,24(01):143-146.
 WANG Qian[],ZHU Zhi-xiang[],SHI Chen-yu[],et al.Encryption and Decryption Engine System Applying to Database Security and Detection[J].,2014,24(01):143-146.
点击复制

应用于数据库安全保护的加解密引擎系统()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年01期
页码:
143-146
栏目:
安全与防范
出版日期:
2014-01-31

文章信息/Info

Title:
Encryption and Decryption Engine System Applying to Database Security and Detection
文章编号:
1673-629X(2014)01-0143-04
作者:
王茜1朱志祥2史晨昱1张磊1
[1]西安未来国际信息股份有限公司;[2]西安邮电大学
Author(s):
WANG Qian[1]ZHU Zhi-xiang[2]SHI Chen-yu[1]ZHANG Lei[1]
关键词:
安全存储加密存储密钥云计算
Keywords:
secure storageencrypted storageencrypted keycloud computing
分类号:
TP302.1
文献标志码:
A
摘要:
针对系统业务数据安全存储问题,采用加解密引擎服务对应用端发送数据进行加密,根据用户ID来识别不同用户的传输命令,利用用户私有的KEY进行加密存储。该方案在云计算平台下具有保护用户数据存储安全、隔离数据的功能。当应用端用户查询已加密数据时,加解密引擎服务端根据用户ID读取缓存区用户密钥,解密数据返回给应用端明文数据。当加解密系统和第三方应用进行集成时,加解密引擎将载入用户定义的加密算法、加密矢量等信息,按照用户自身的密钥加密敏感数据,可保证用户敏感数据存储安全并隔离不同用户的业务数据。以某市人口库系统集成为例,验证了方案的可行性。
Abstract:
In order to implement the secure storage of the system transaction data,the encryption and decryption engine is used to encrypt the data that transmitted from the application terminal. The transfer commands of different users can be identified by the user ID,and the user's private key can be used to achieve encrypted storage. The scheme can protect the storage security of user data and isolate data in cloud computing platform. When the users from application terminal query the encrypted data,the encryption and decryption engine server-side will read the user's private key from the buffer according to the user ID,then the server-side will decrypt the data and return clear text to application terminal. When the encryption and decryption system is integrated with a third-party application,the user-defined en-cryption algorithm and encryption vector information will be loaded in the encryption and decryption engine,then the sensitive data will be encrypted according to the user's own private key,which can guarantee the secure storage of sensitive data and achieve isolation for business data of different users. Finally,the integration with the population database system of a city is used as an example to verify the feasibility of the scheme.
更新日期/Last Update: 1900-01-01