Database encryption method and encryption database query method

An encryption method and database technology, applied in the field of data privacy protection, can solve problems such as low execution efficiency, inability to execute on ciphertext, loss, etc., to achieve the effect of protecting privacy, reducing communication and computing overhead, and improving execution efficiency

Active Publication Date: 2016-07-20
托付保(南京)电力技术有限公司
View PDF5 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that after the plaintext data is encrypted, some attributes of the plaintext are lost, such as the order relationship between the data, and the original operations on the plaintext cannot be performed on th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database encryption method and encryption database query method
  • Database encryption method and encryption database query method
  • Database encryption method and encryption database query method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0064] The specific embodiments of the present invention will be described in further detail below with reference to the accompanying drawings.

[0065] In the actual application process, a database encryption method designed by the present invention comprises the following steps:

[0066] Step 001. Judge the data type of each data column in each table in the database respectively. If the data type of the data column is a numeric type (int, float, double), then enter step 002; if the data type of the data column is a character type ( char, varchar, text), then go to step 003.

[0067] Step 002. For each data in the numerical data column, respectively adopt the equivalent encryption algorithm, the preservation encryption algorithm and the homomorphic encryption algorithm to encrypt respectively, and expand the numerical data column into three columns, and then press the three columns. The relationship between the column and the equivalent encryption algorithm, the preservation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a database encryption method. The equivalent encryption algorithm, the preserving encryption algorithm and the homomorphic encryption are specifically designed and introduced to classify and encrypt data in a database, the data is saved in a server database, the hidden hazard that untrusted servers search for and leak confidential data is eliminated, and data privacy is protected. The invention further relates to an encryption database query method based on the database encryption method. On the basis that the equivalent encryption algorithm, the preserving encryption algorithm and the homomorphic encryption are specifically designed and introduced to classify and encrypt data in the database, a processing method for directly executing query operation on ciphertext is provided, execution efficiency is improved, and communication and calculation cost is reduced for users.

Description

technical field [0001] The invention relates to a database encryption method and the encrypted database query method, belonging to the technical field of data privacy protection. Background technique [0002] Privacy protection is an important part of database security. Its security threats come from two aspects. One is outside the database system. Attackers exploit system vulnerabilities or illegally obtain access rights to steal private data; the other is inside the database system. Database administrators with legal access rights have the possibility of probing and leaking private data. [0003] For this, the solution in the prior art is to encrypt the private data and store it in the database, and decrypt the ciphertext data when inquiring. The disadvantage of this method is that after the plaintext data is encrypted, some attributes of the plaintext are lost, such as the order relationship between the data, and the original operations on the plaintext cannot be perform...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6218G06F2221/2107
Inventor 杨庚汪海伟刘国秀曾橙焜闵兆娥
Owner 托付保(南京)电力技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products