期刊文献+

数据库加密字符串快速查询方法研究 被引量:5

Practical techniques for fast query over encrypted character data in database
下载PDF
导出
摘要 为了提高在数据库中查询加密字符串数据的性能,提出一种新的基于对偶特征码的快速查询方法。特征码与加密字符串数据一一对应,作为索引保存在索引字段中。查询时使用两阶段查询策略,首先利用索引字段对加密数据进行一次粗糙查询以过滤掉与查询不相关的记录,然后在解密的数据上再进行一次精确查询,对粗糙查询结果进行二次过滤,得到符合查询条件的记录。实验表明,该方法的性能比现有查询方法有较大提高。 To improve the performance of querying encrypted character data in database,this paper proposed an approach based on characteristic code of pairs coding that generated characteristic codes for encrypted data as index stored in an index field.When querying the encrypted character data,applied the principle of two-phase query.In the first place,implemented a coarse query over the encrypted data to filter the records which not related to the querying conditions.Then decrypted the rest records and implemented a...
作者 曹杨 何大可
出处 《计算机应用研究》 CSCD 北大核心 2009年第2期736-738,共3页 Application Research of Computers
关键词 数据库加密 加密字符串查询 对偶特征码 两阶段查询 database encryption query over encrypted character data pairs characteristic codes two-phase query
  • 相关文献

参考文献1

二级参考文献10

  • 1Oracle. Oracle9i database security for eBusiness, http://www.oracle.com/technology/deploy/ security/oraclegi/pdf/gisecbpa.pdf. 2001
  • 2Fanghanel T. Using encryption for secure data storage in mobile database systems: [Ph D dissertation]. Jena,Germany:Friedrich Schiller University, 2002
  • 3Hacigumus H, Lyer B, Li Chen, et al. Executing SQL over encrypted data in the database-serve-provider model. The 2002 ACM SIGMOD Int'1 Conf on Management of Data, Madison, Wisconsin, 2002
  • 4王正飞 王曼 汪卫 等.数据库中加密字符数据的存储与查询[J].计算机研究与发展,2004,41(1):66-71.
  • 5TPC-H. Benchmark specification, http://www. tpc. org,2004
  • 6Waters B R, Balfanz D, Durfee G, et al. Building an encrypted and searchable audit log. In: The 11^th Network and Distributed System Security(NDSS)Symposium,San Diego,California,2004
  • 7Chang Yan-Cheng, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data. In: Proceedings of ACNS 2005,Lecture Notes in Computer Science 3531, Springer-Verlag,2005. 442-455
  • 8Song D Xiaodong, Wagner D, Perrig A. Practical techniques for searches on encrypted data. The IEEE Symp on Security and Privacy, Oakland, California, 2000
  • 9Haeigumus H, Lyer Bala, Mehrotra S. Providing database as a service. The 18th Int'l Conf On Data Engineering,San Jose,California, 2002
  • 10He Jingmin, Wang Min. Cryptography and relational database management system. Interactive Dialogue with Educator form Across State, 2001

共引文献12

同被引文献58

引证文献5

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部