期刊文献+

XML数据库的加密与密文检索 被引量:2

Study on Querying Encrypted XML Databases
在线阅读 下载PDF
导出
摘要 提出一种基于曲线插值的数据库加密和密文检索模型,该模型通过可扩展标记语言(XML)节点的隐藏机制控制加密粒度,利用曲线插值变换改变数据库密文分布,可有效地抵御各类针对数据库的攻击.在此基础上建立了XQuery检索翻译器,该翻译器支持数值范围检索,且只需解密少数密文,可提高检索效率,并证明加密模型具备足够的安全性.以OracleXMLDB为例进行实验的结果显示,密文检索效率达到无索引明文检索的65%. The security and query effectiveness must be considered in the extensible markup language(XML)encryption.To address these problems,an approach based on curve interpolation is presented.Firstly,more flexible encryption granularity can be obtained through a XML node-hide mechanism;secondly,more efficiency to resist various kinds of database attack due to the changing of ciphertext distribution and data size.A XMLQuery(XQuery)is established.The proposed model offers greater security,and the ciphertext query performance can amount to 65% of the plaintext query based on the result of experimental simulation.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2010年第2期105-110,共6页 Journal of Beijing University of Posts and Telecommunications
基金 国家高技术研究发展计划项目(2009AA01Z430) 北京市自然科学基金项目(9092009) 国家重大科技专项项目(2009ZX03004-003-03)
关键词 曲线插值 可扩展标记语言数据库 密文检索 加密粒度 curve interpolation extensible markup language database ciphertext query encryption granularity
  • 相关文献

参考文献4

  • 1张春,刘峰,王永亮.Oracle数据库安全增强系统的设计与实现[J].北京邮电大学学报,2006,29(5):84-87. 被引量:5
  • 2Wang H, Lakshmanan L. Efficient secure query evaluation over encrypted XML databases[ J]. 32^nd International Conference on Very Large Data Bases, 2006, 9: 12-15.
  • 3Agrawal R, Kiernan J, Srikant R. Order preserving encryption for numeric data[ C]//The ACM SIGMOD Inter- national Conference. Paris : [ s. n. ] , 2004 : 563-574.
  • 4Feng L, Jonker W. Efficient processing of secured XML metadata[ C]///OTM Workshops 2003. Catania: Springer, 2003: 704-717.

二级参考文献4

  • 1Bell D E, LaPadula L J. Secure computer systems: unified exposition and multics interpretation [ M ]. [ S. l. ] :The MITRE Corp, 1976.
  • 2Deborah Steiner. A76933-01-1999, Net8 Administrator's Guide Release 8.1.6 Oracle Corporation[ S].
  • 3William Stallings. Cryptography and network security:principles and practice[ M]. [ S. l. ] : Pearson Education,2002.
  • 4Latham D C. DoD 5200.28-STD-1985, Trusted computer system evalution criteria[ S]. [ S. l. ] : Department of Defence, 1985.

共引文献4

同被引文献11

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部