透過您的圖書館登入
IP:18.224.62.25
  • 學位論文

可排序搜尋加密資料庫之實作

Implementation of Sortable Encrypted Database

指導教授 : 李肇林

摘要


隨著網路的興起,網頁資料庫系統也越來越多,有許多公司因為頻寬的因素,會將網頁及資料庫系統放在外面別人所提供的空間由別人代管,此時便存在一個問題在於當資料庫裡面存放著敏感性的資料時,我們無法防止資料庫管理者利用他的管理者權限進入資料庫中竊取我們的資料。 為了解決這個問題,本論文將實作一個基於網路服務模型的SQL查詢轉換系統,藉由將SQL查詢加密的方式,將資料做加密後再放至遠端資料庫,當要對資料庫查詢時,先將SQL查詢做適當的轉換加密後,再傳送至資料庫,待資料庫回傳結果後,再解密回原來的資料送給客戶端。

並列摘要


With the risen of internet, there are more and more webpage database systems. Many companies put their webpage and database in the host which is provided by others due to the network bandwidth. This also comes up with a problem that is when we store sensitive data in databases, we can’t protect data from malicious DBAs’ theft because DBAs have the most powerful privileges in databases and they can do anything they want. In this thesis, we will develop a Web-Service based SQL query translation system. We encrypt data by encrypting SQL query before send to database. When we want to query database, system will first encrypt SQL query, then send it to remote database, after the database send back the result, system will decrypt the result and send it back to client.

參考文獻


[1] Web Services Architecture, 2007, http://www.w3.org/TR/ws-arch/
[4] Mattsson, U.T. A Practical Implementation of Transparent Encryption and Separation of Duties in Enterprise Databases: Protection against External and Internal Attacks on Databases. E-Commerce Technology, 2005. CEC 2005. Seventh IEEE International Conference on 19-22 July 2005 Page(s):559 - 565
[5] Pseudorandom number generator, 2007, http://en.wikipedia.org/wiki/Pseudorandom_number_generator
[6] 八位元Pseudo-Random Number Generator, 2007, http://www.holtek.com.tw/chinese/tech/appnote/uc/pdf/ha0085t.pdf
[8] Hakan Hacıg¨um¨us, Bala Iyer, Chen Li and Sharad Mehrotra. Executing SQL over Encrypted Data in the Database-Service-Provider Model. In Proc. of ACM SIGMOD, 2002.

延伸閱讀