Database encryption method supporting combinable SQL query

A database and data technology, which is applied in database update, digital data protection, electronic digital data processing, etc., can solve the problems of insecurity, user privacy exposure to service providers, and safe and efficient operation of unencrypted data. Less time consumption, strong versatility, and the effect of reducing leakage

Pending Publication Date: 2021-11-26
ZHEJIANG UNIV
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2014, a scheme was proposed at the Sigmod meeting to realize the encrypted database using the multiplication encryption scheme, but this scheme is not safe and is quite different from the present invention
However, storing data at the service provider faces two problems: if the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Database encryption method supporting combinable SQL query
  • Database encryption method supporting combinable SQL query
  • Database encryption method supporting combinable SQL query

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0082] Assume that user A of the sales company stores his own data set M in a service provider B, and requires service provider B not to obtain any information about M. In addition, user A requires the ability to perform operations on the data set M without revealing privacy (operations include but are not limited to update, insert, delete, add, search for specified keywords, and query specified ranges, such as returning orders with a transaction amount greater than 5,000). In order to solve this situation, utilize a kind of encryption database method that supports combinable SQL inquiry of the present invention, satisfy the requirement of user A, specifically comprise the following steps:

[0083] Step (1) Encrypting and storing data: User A encrypts and preprocesses data M, and uploads the encrypted result and preprocessed data to service provider B, who provides software, devices, and electronic equipment for running the database Or the storage medium is used to store the d...

Embodiment 2

[0149] The present invention discloses an encrypted database system that supports combinable SQL queries, which can perform any secure storage of user data provided by any embodiment of the present invention and support update, insertion, deletion, addition, search for specified keywords and user data. Query the capabilities of the specified range. The encrypted database system supporting combinable SQL queries includes a user device module and a service provider module; the user device module encrypts and preprocesses user data, and uploads the encrypted result and preprocessed data to the service provider module; The user module executes data operation instructions, uploads operation instructions to the service provider module according to actual needs, and the operation instructions include updating, inserting, deleting, summing, searching for specified keywords and querying specified ranges, and uploads auxiliary parameter operation instructions to the service provider mod...

Embodiment 3

[0151] In the field of database, an enterprise runs the database test international standard TPC-C to conduct transactions, that is, a certain cargo warehouse accepts orders from multiple users at the same time, and the warehouse has multiple transactions with these users at the same time. In order to save memory and improve performance, the warehouse encrypts and stores transaction data in the cloud. According to the needs of real-time transactions, the warehouse continuously submits SQL instructions to the encrypted data in the cloud (instructions include update, insert, delete, sum, search for specified keywords and query Specified range), according to the meaning of the order for the actual transaction, the order is divided into five sets:

[0152] 1. New-Order: The customer enters a new order transaction.

[0153] 2. Payment operation (Payment): update the customer account balance and reflect its payment status.

[0154] 3. Delivery (Delivery): delivery (simulating batch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a database encryption method supporting combinable SQL query. The scheme mainly comprises the following steps that: (1) based on an encryption method provided by the invention, a user encrypts and preprocesses data, and uploads an encryption result and preprocessed data to a service provider; (2) an SQL query instruction is set and uploaded: the user uploads a query instruction to a service provider according to an actual demand, and uploads an auxiliary parameter used for querying the instruction at the same time; and (3) data query is performed: the service provider performs SQL query according to a query instruction and auxiliary parameters received from the user, stores a calculation result, updates data and returns a query result to the user. The method can be applied to data encryption storage and encrypted data query in actual life and business, and has the advantages of being high in universality, safe, efficient, capable of protecting privacy, easy and convenient to use, high in efficiency, small in memory and time consumption and the like.

Description

technical field [0001] The invention relates to the technical fields of discrete logarithm problem, multiplication encryption, encrypted database and ciphertext search, in particular to an encrypted database method supporting combinable SQL queries. Background technique [0002] The discrete logarithm problem refers to the problem of finding the logarithm in a computable finite cyclic group, which was published in 1976 by W.Diffie and E.Hellman. So far, the discrete logarithm problem is still considered to be difficult to solve, so it is widely used in encryption. [0003] Multiplicative encryption is widely used in cryptography, including well-known encryption schemes such as ElGmal and RSA. Multiplicative encryption can achieve "perfect security" and can guarantee multiplicative homomorphism under ciphertext, that is, the multiplication operation on ciphertext is also the multiplication operation on plaintext. Therefore, multiplicative encryption achieves good security a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/2455G06F21/62G06F16/23
CPCG06F16/24553G06F16/2358G06F21/6245
Inventor 刘健曹新乐芦浩任奎
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products