Ciphertext database privacy protection enquiring method

A privacy protection and query method technology, which is applied in electrical digital data processing, special data processing applications, instruments, etc. It can solve the problem that the ciphertext data table does not maintain the same attribute value sequence relationship of different attributes, limited security, and single query method, etc. question

Inactive Publication Date: 2009-05-20
BEIJING JIAOTONG UNIV
View PDF0 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 1. The calculation speed is slow: when creating the ciphertext data table, the block encryption algorithm is used twice for each attribute value of each record, and the calculation complexity is relatively large, which results in the generation of the ciphertext data table. Restricted; and when querying, if there are many query results that may be obtained, due to the same reason, there will be a problem of long processing time when querying, so the efficiency of the solution needs to be improved
[0010] 2. The query method is single: when the ciphertext data ta

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext database privacy protection enquiring method
  • Ciphertext database privacy protection enquiring method
  • Ciphertext database privacy protection enquiring method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0043] figure 1 is a schematic diagram of a ciphertext database query system according to an embodiment of the present invention. Wherein the original data encryption processing unit, the query client and the database server are connected to each other through the network. The network includes, but is not limited to, a local area network, a wide area network, and the Internet.

[0044] figure 2 It is a flow chart of data processing for an original data encryption processing unit to obtain a ciphertext value and an index value according to an embodiment of the present invention. As we all know, in the database query system, the most critical is the data structure of the stored data in the database, and the query protocol of how to use the stored data structure to query.

[0045] The data structure of the stored data set in the ciphertext d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to realization of query of encrypted database tables by utilization of a structuralized additional data structure on the premise that an internal operating mechanism of a database management system is not changed, which comprises an encrypt data containing an index query structure generation method and a whole encrypt query process. A database server judges the retrievable information range of cryptographic keys of certain levels held by users first, and quickly performs information retrieval within the information range, so as to protect the privacy of information in the database.

Description

technical field [0001] The invention relates to database and information security technology, in particular to a query method for a ciphertext database. Background technique [0002] With the continuous development of information technology, the application of database system is becoming more and more popular. The use of database system to realize data sharing can make people's daily life and work more convenient and faster, but at the same time, it also provides more opportunities for illegal access to database data information. With more opportunities, the problem of sensitive data protection in database systems is becoming more and more serious. [0003] Among many protection methods for sensitive data, encrypting the data information in the database is a very effective solution. But on the other hand, after the data in the database is encrypted, the original same keywords may become different ciphertext information, and the sequence relationship between keywords is also...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30
Inventor 刘吉强杨光韩臻
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products