期刊文献+

基于代理重加密的PostgreSQL系统访问控制方法 被引量:4

PostgreSQL System Access Control Method Based on Proxy Re-encryption
下载PDF
导出
摘要 针对当前数据库隐私数据泄密事件频发的现状,设计基于RSA的代理重加密授权访问方法,并在其基础上提出基于对称加密系统的优化方法。通过对加密后的数据授权生成镜像层和对用户权限划分,构建权限控制层,实现无副本数据访问共享,从而防止数据泄密。实验结果表明,与基于公钥系统的方法相比,该方法具有更好的重加密和数据访问效率,提高了PostgreSQL数据库的访问性能。 In view of the current status of frequent database privacy data leakage incidents,the RSA-based proxy reencryption authorization access method is designed,and on the basis of it,an optimization method based on a symmetric encryption system is proposed. Construct a permission control layer by encrypting the encrypted data to create a mirroring layer and dividing the user's authority. It can enable data access sharing without copy to prevent data leaks. Experimental results show that compared with the method based on public key system,this method has higher re-encryption and data access efficiency,and improves the access performance of PostgreSQL database.
作者 刘红超 缪燕 郝悍勇 杨利兵 吴璠 LIU Hongchao1, MIAO Yan1, HAO Hanyong2, YANG Libing1, WU Fan3(1. Beijing Xuji Electric Co. ,Ltd. ,Beijing 100085, China; 2.State Grid Corporation of China,Beijing 100085 ,China; 3. School of Computer, Wuhan University, Wuhan 430074, Chin)
出处 《计算机工程》 CAS CSCD 北大核心 2018年第8期192-198,共7页 Computer Engineering
基金 北京市科技计划课题(D171100005817001)
关键词 PostgreSQL系统 隐私数据 代理重加密 RSA公钥加密 对称密钥 PostgreSQL system private data proxy re-encryption RSA public key encryption symmetric key
  • 相关文献

参考文献5

二级参考文献30

  • 1翁健,陈泯融,杨艳江,邓慧杰,陈克非,鲍丰.无需随机预言机的自适应攻陷模型下选择密文安全的单向代理重加密方案[J].中国科学:信息科学,2010,40(2):298-312. 被引量:8
  • 2Blaze M,Bleumer G,Strauss M.Divertible Protocols and AtomicProxy Cryptography[C]//Proceedings of EUROCRYPT’98.Berlin,Germany:Springer-Verlag,1998:127-144. 被引量:1
  • 3Chu Chengkang,Weng Jian,Sherman S M C.Conditional ProxyBroadcast Re-encryption[C]//Proc.of ACISC’09.Berlin,Germany:Springer-Verlag,2009:327-342. 被引量:1
  • 4Zheng Yuliang.Digital Signcryption or How to Achieve Cost(Signature&Encryption)<. 被引量:1
  • 5Kirtane V,Rangan C P.RSA-TBOS Signcryption with ProxyRe-encryption[EB/OL].[2011-04-12].http://eprint.iacr.org/2008/324. 被引量:1
  • 6Chandrasekar S,Ambika K,Pandu R C.Signcryption with ProxyRe-encryption[EB/OL].[2011-04-22].http://eprint.iacr.org/2008/276. 被引量:1
  • 7Royal K D,Akers K S,Lybarger M A,et al.Using Social Network Analysis to Evaluate Research Productivity and Collaborations[J].The Journal of Faculty Development,2014,28(1):49-58. 被引量:1
  • 8Tramp S,Frischmuth P,Ermilov T,et al.An Architecture of a Distributed Semantic Social Net-work[J].Semantic Web,2014,5(1):77-95. 被引量:1
  • 9He Fei,Chen Meilian,Tang Rong,et al.Construction and Algorithm Analysis of a Social Network System Structure Based on P2P[J].Applied Mechanics and Materials,2014,443(8):504-508. 被引量:1
  • 10Zhou Bin,Pei Jian.Preserving Privacy in Social Networks Against Neighborhood Attacks[C]//Proceedings of the24th IEEE International Conference on Data Engineering.Cancun,Mexico:IEEE Press,2008:506-515. 被引量:1

共引文献11

同被引文献38

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部