Ciphertext database query method and system based on vertical partitioning
A query method and query system technology, which are applied in the field of ciphertext database query and database query based on vertical division, and can solve problems such as the inability to support multi-granularity authorization policies.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0094] Such as figure 1 As shown, the present embodiment provides a method for querying a ciphertext database based on vertical division, the method comprising the following steps:
[0095] S1. For each table in the database, perform vertical partitioning according to the structure and characteristics of column data and the characteristics of data application obtained from statistical user queries, and obtain vertically partitioned related column sets.
[0096] S2. Encrypt the vertically divided relevant column set data to obtain ciphertext column data based on vertical division;
[0097] S3. Authorize the ciphertext column data based on vertical division at different granularities;
[0098] S4. Verifying the authorization based on the vertically divided ciphertext column data;
[0099] S5. Query the corresponding authorization granularity for the vertically partitioned ciphertext column data that has passed the verification;
[0100] S6. Decrypt the ciphertext column data ...
Embodiment 2
[0150] Such as figure 2 As shown, the present embodiment provides a ciphertext database query system based on vertical division, which corresponds to the method in Embodiment 1, and mainly includes a vertical division module, an encryption module, an authorization module, an authorization verification module, a query execution module and The decryption module, wherein the vertical division module, the encryption module, the authorization module and the decryption module are deployed on the client side, that is, the vertical division module, the encryption module, the authorization module and the decryption module are the functional modules of the first processor, the authorization verification module and the query execution module Deployed on the server, that is, the authorization verification module and the query execution module are function modules of the second processor.
[0151] The specific functions of each module are as follows:
[0152] A. The vertical division mod...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com