Data integrity verification method for shared outscored database

A technology for data integrity and integrity verification, applied in digital data protection, electronic digital data processing, special data processing applications, etc.

Active Publication Date: 2012-06-13
WUHAN DAMENG DATABASE
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the data decomposition method in the shared outsourcing database mode solves the problem of data confidentiality to a certain extent, when the data is maliciously modified, deleted and inserted, there is still a lack of a mechanism to check whether the data queried by the user has been maliciously modified or not. Deleted, and found out which database service provider modified it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data integrity verification method for shared outscored database
  • Data integrity verification method for shared outscored database
  • Data integrity verification method for shared outscored database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The present invention will be further described below in conjunction with the accompanying drawings and examples, but these examples should not be construed as limiting the present invention.

[0012] The present invention implements in three steps:

[0013] Define a basic table Table1 (coll int) in the database, and create a table with the same name in the database servers of N=5 database service providers to store the decomposed data fragments. Suppose K=3 at this time, where (X1, X2, X3, X4, X5)=(10, 5, 3, 7, 2), that is, the five DSPs are numbered 10, 5, 3, 7, 2 respectively. The polynomial that decomposes the original data is: a 1 x i 2 +a 2 x i +real(i=1,...,5), where real is a true value, x i The value is the number of the DSP server. a 1 The coefficient is generated by a monotonically increasing function f(x)=2x+5, a 2 The coefficients are generated with a monotonically increasing function g(x)=|_logx_|+6, and the variable x=real.

[0014] During syste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data integrity verification method for a shared outscored database, which specifically comprises the following steps of: decomposing data values into a plurality of data fragments by adopting a polynomial, and storing the data fragments into a plurality of database service providers (DSP) respectively, wherein the polynomial takes the serial number of the DSP as a variable and has a coefficient value calculated by a monotone increasing function which takes the data value as the variable; and in query, decomposing matched data values in the same way to further convert the query into the query of the plurality of DSPs, constructing a polynomial form-based system of linear equations according to query results and the serial numbers of the queried DSPs, solving the system of equations, verifying whether the solved polynomial coefficient and synthesis data values satisfy the monotone increasing function relation or not, determining the data passes the integrity verification if the solved polynomial coefficient and the synthesis data values satisfy the monotone increasing function relation, otherwise, determining the data does not pass the integrity verification. The method has the advantage of determining whether the integrity of the data is damaged or not to further ensure the integrity of the data by judging whether the original monotone increasing function relation is kept between the synthesis data and the polynomial coefficient or not.

Description

technical field [0001] The invention belongs to the technical field of database application in computers, and in particular relates to a data integrity verification method for sharing outsourced databases. Background technique [0002] With the rapid development of information technology, in order to improve work efficiency, more and more enterprises need to purchase software and hardware equipment and hire professional technicians to maintain data in order to manage a large amount of internal data, which brings human resource costs and business operations. rising costs. In view of the cost of traditional data management, more and more enterprises tend to adopt a new data management model - outsourced database, that is, enterprises hand over their data to database service providers for data hosting. According to the number of database server providers required to support an application, it is divided into traditional outsourcing databases and shared outsourcing databases. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F17/30G06F21/64
Inventor 韩朱忠徐纲付铨蔡畅
Owner WUHAN DAMENG DATABASE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products