期刊文献+

基于动态变换技术的数据库加密方法研究 被引量:3

RESEARCH ON DYNAMIC TRANSFORMATION TECHNOLOGY BASED DATABASE ENCRYPTION METHODS
下载PDF
导出
摘要 随着信息技术的发展,数据库在信息管理的应用已非常广泛。为了确保数据库的安全,提出基于内层加密函数对数据库表的动态变换加密技术,动态变换加密能使当前行、列数据的加密密钥做到互不干扰。由于经济类财务数据以数值型数据为主,把明文转化为密文后,密文还是数值,与原数据表述物品的数量、金额的方式无差别,因而从数据外观判断不了数据的真实性与合法性,该技术既对数据进行了加密,同时也扰乱了破解者的视线,做到更深层次地保护数据库的目的。 With the development of information technology,the database is quite extensively applied to information management.In order to ensure database security,dynamic transformation encryption methods based on inner encryption function upon database tables are proposed.Dynamic transformation encryption can prevent the encryption keys of present rows or columns from disturbing each other.Since the economic class financial data mainly comprises of numerical data,when the plain text is converted into cipher text,the cipher text remains numerical,keeping the same representation manner of commodity numbers and prices as the original data,so that it is impossible to judge the authenticity and legitimacy of the data just from its appearance.Therefore it not only encrypts data but also deceives the cracks' vision so as to protect the database at a deeper level.
出处 《计算机应用与软件》 CSCD 北大核心 2012年第3期290-293,共4页 Computer Applications and Software
基金 罗定职业技术学院重点科研课题(KY10032)
关键词 数据加密 动态变换 数据库 Data encryption Dynamic transformation Database
  • 相关文献

参考文献13

二级参考文献73

共引文献62

同被引文献35

  • 1顾平.数据库设计工具PowerDesigner的研究与实践[J].计算机应用与软件,2004,21(11):18-20. 被引量:25
  • 2范振钧.基于ASP.net的三层结构实现方法研究[J].计算机科学,2007,34(4):289-291. 被引量:110
  • 3I田秀霞,王晓玲,高明.数据库服务一安全与隐私保护[J].计算机学报,2010,21(5):991-1006. 被引量:2
  • 4Christian C, Idit K, Shraer A. Trusting the cloud [ J]. ACM SIGACTNews,2009,40(2) :81 -86. 被引量:1
  • 5Cloud Security Alliance. Security Guidance for Critical Areas of Focusin Cloud Computer[ M]. 2009. 被引量:1
  • 6Franco J, Swaminathan R. On good algorithms for determining unsatisfi-ability of propositional formulas [ J]. Discrete Applied Mathematics,2003^130(2) :129-138. 被引量:1
  • 7Lodha S, Thomas D. Probabilistic anonymity [ C] //Proc of the 1st In-ternational Workshop on Privacy, Security, and Trust in KDD. NewYork : ACM Press , 2007:56 - 79. 被引量:1
  • 8Schneier B. Applied cryptography : protocols, algorithms, and sourcecode in C[ M]. New York:John Wiley and Sons Inc, 1994. 被引量:1
  • 9Gertner Y,Goldwasser S,Malkin T. A random server model for privateinformation retrieval or how to achieve information theoretic PIR avoi-ding database replication [ C] //Proc of the 2nd Intemationai Workshopon Randomization and Approximation Techniques in Computer Sci-ence. Berlin:Springer, 1998 :2()0 -217. 被引量:1
  • 10Kantarcioglu M, Clifton C. Privacy preserving distributed mining of as-sociation rules on horizontally partitioned data [ J]. IEEE Trans onKnowledge and Data Engineering,2004 : 1026 ~ 1037. 被引量:1

引证文献3

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部