Encrypted database construction method and device, medium and equipment

A construction method and a technology for encrypting data, applied in the computer field, can solve the problems of weak security and low reliability of the pre-agent, and achieve the effects of solving weak security, improving security, and solving low retrieval efficiency.

Pending Publication Date: 2022-03-29
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides an encrypted database construction method, device, medium and equipment to solve the problem of relatively weak security of the pre-agent in the prior art. The excellent features of security and reliability, acting as the pre-agent of the encrypted database, can effectively solve the problem of weak security and low credibility of the pre-agent of the encrypted database, and improve the security and credibility of the pre-agent of the encrypted database

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted database construction method and device, medium and equipment
  • Encrypted database construction method and device, medium and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0066] see figure 1 , figure 1 It is a flow chart of an encrypted database construction method provided by an embodiment of the present invention, and the encrypted database construction method includes:

[0067] The operation method for constructing the encrypted database includes data addition operation S1, data query operation S2, and data deletion operation S3;

[0068] The data addition operation S1 includes:

[0069] S11. When the user adds data to be adde...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encrypted database construction method and device, a medium and equipment, and the method comprises the steps: encrypting data through employing a symmetric encryption algorithm, encrypting a symmetric key through employing a public key encryption algorithm, carrying out the encryption and retrieval of a keyword through employing a searchable encryption algorithm, and obtaining an encrypted database; constructing a data adding operation, a data query operation and a data deleting operation of the encrypted database based on the block chain; by adopting the embodiment of the invention, the problems of weak security and low credibility of the front agent of the encrypted database can be effectively solved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to an encrypted database construction method, device, medium and equipment. Background technique [0002] Data is both a resource and an asset. In the environment of data explosion caused by the rapid development of social informatization and networking, protecting important data from being leaked has become a major concern of the international community. As an indispensable tool for big data storage, the database has become an indispensable data "file cabinet" for governments, enterprises, and even individuals in various countries, and the security of this "file cabinet" has become a hot issue for countless researchers . [0003] At present, encrypted databases usually use pre-proxy and encryption gateway technology, that is, a security proxy service is added in front of the database, and users who access the database must pass through the security proxy service. In thi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/21G06F21/60G06F21/62G06F21/64
CPCG06F16/211G06F21/602G06F21/6218G06F21/64
Inventor 徐培明杨祎巍蒋屹新陈霖张宇南
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products