A searchable database security encryption system

A security encryption and database technology, applied in digital data protection, electronic digital data processing, special data processing applications, etc., can solve the problem that ciphertext cannot directly execute SQL operations, and achieve the effect of protecting data privacy

Inactive Publication Date: 2019-05-28
GUANGDONG POWER GRID CO LTD INFORMATION CENT
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention studies the operability of relational database character type and numerical type data after encryption. In order to solve the problem that SQL operations cannot be directly performed on ciphertext while ensuring security, a method including SQL rewriting and plaintext data is designed and implemented. Searchable database security encryption system including functions such as encryption and query processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A searchable database security encryption system
  • A searchable database security encryption system
  • A searchable database security encryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in further detail below in conjunction with specific examples, but the scope of the present invention is not limited in any way.

[0036] Design idea of ​​the present invention: the searchable database security encryption system regards the database server as an untrusted terminal. The user enters the SQL statement, and the system encrypts the secret-related plaintext data into ciphertext and stores it on the server side. When the SQL statement is executed, the system rewrites the statement, hides the column names and encrypts the plaintext in it, and at the same time dynamically adjusts the encryption model in the database so that the rewritten statement can be directly executed on the ciphertext.

[0037] figure 1 Architecture diagram for a searchable database security encryption system. The system consists of five core modules: metadata management module, key management module, encryption and decryption module, SQL statement ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a searchable database security encryption system. The system comprises a metadata management module, a key management module, an encryption and decryption module, an SQL statement rewriting module, a database connection module, a metadata table and an encryption model. According to the searchable database security encryption system, the encryption layer is dynamically adjusted in the statement execution process, so that a complex SQL statement is directly executed on a ciphertext, an untrusted database server is prevented from exposing plaintext data, and the data privacy is protected.

Description

technical field [0001] The invention relates to database information security, and belongs to the technical field of information security; in particular, it relates to a searchable database security encryption system. Background technique [0002] Since the era of cloud computing, many enterprises have chosen to store massive amounts of data in the cloud. Due to the reduction of local storage and powerful cloud computing capabilities, enterprises can greatly reduce IT costs, and there are also security concerns. In an open cloud computing environment, internal employees of an enterprise can easily access, tamper with and leak private data, and the results of these behaviors are disastrous for the enterprise. [0003] At present, cloud service providers do very limited work on information security, and encrypting and storing data is a relatively safe way to ensure security. After the data is encrypted, even if the "snooper" of the data obtains the data, the private informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F16/242
Inventor 杨永娇唐亮亮黄晓波
Owner GUANGDONG POWER GRID CO LTD INFORMATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products