Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Multi-search supporting design method for encrypted database middleware

A design method and database technology, applied in the field of information security, can solve problems such as data leakage, privacy security concerns, and inability to support querying of database aggregation functions, so as to ensure consistency and improve security.

Active Publication Date: 2015-09-02
NANJING UNIV OF POSTS & TELECOMM
View PDF8 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the cloud computing services that have been implemented, privacy and security issues have always been worrying, and have become one of the main factors hindering the development and promotion of cloud computing.
[0006] A database ciphertext query method (patent number: 2005101309070, application date: 2006.06.14, publication number: CN1786963), although it realizes ciphertext data query without changing the original database, it can only support equivalent The ciphertext query does not support multiple query methods (such as range query)
Patent "A method for protecting personal privacy data at the server side in a network information system" (patent number: 2014101180124, application date: 2014.09.03, publication number: CN103973668A), although precise query, similar query, Range query, etc., but cannot support the query of the aggregate function of the database, and the indexing process is complicated, and the cost of time and space is very high
None of the above patents support the anonymization of the data relational model, which will cause the disclosure of the meaning of the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-search supporting design method for encrypted database middleware
  • Multi-search supporting design method for encrypted database middleware
  • Multi-search supporting design method for encrypted database middleware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Below in conjunction with accompanying drawing, the present invention is described in further detail.

[0025] 1. Architecture

[0026] Such as figure 1 As shown, the middleware system of the present invention is built between the client and the database, the original SQL statement of the client is received by the multi-query middleware system, and the database is realized by rewriting the SQL statement on the basis of establishing a ciphertext data dictionary. Data encryption and relational schema anonymization. The system can receive the query results of encrypted data in the database, and decrypt the ciphertext data through the established ciphertext data dictionary, so that the client can obtain usable plaintext data. This architecture can realize the transparency of the client to the database, only needs the client to use the standard SQL statement, and does not modify the original structure of the database, and can realize the query of the ciphertext data of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-search supporting design method for an encrypted database middleware, and aims at encrypting data and anonymizing a data relation mode so as to protect the safety of data stored in a relation database under a cloud environment with database outsourcing service, as well as preventing data privacy from being pried and disclosed by a cloud service supplier on the premise that the availability of the data is ensured. The method mainly comprises the steps of enabling correspondence of the data encrypting storing type and search type; building a local data dictionary; rewriting SQL statements. The method can support encrypted data storage by a plurality of modes, anonymizing of the relation mode, and various modes of searching the encrypted data dictionary and encrypted data. The method is easy to carry out, high in safety and high in efficiency, supports equivalent search, range search, aggregate search, Top-k search and other search modes, is free of modification on database software, and widely supports various commercial relation databases.

Description

technical field [0001] The invention relates to a design method of a ciphertext database middleware supporting multiple queries, and belongs to the technical field of information security. Background technique [0002] As a new network computing model, cloud computing provides users with on-demand IT services (ie computing, storage and applications, etc.) in a more economical way than traditional IT services. Because the development concept of cloud computing is in line with the current general trend of low-carbon economy and green computing, it has been vigorously advocated and promoted by governments and enterprises all over the world, bringing about tremendous changes in the computing and business fields. [0003] However, in the cloud computing services that have been implemented, privacy security issues have always been worrying, and have become one of the main factors hindering the development and promotion of cloud computing. The user's private data includes informat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/44G06F17/30
Inventor 戴华王磊王琛羊梦娇保静静杨庚
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products