计算机应用 ›› 2011, Vol. 31 ›› Issue (01): 110-114.

• 信息安全 • 上一篇    下一篇

基于加密技术的外包数据库服务集成安全

余永红1,柏文阳2   

  1. 1. 安徽财经大学
    2.
  • 收稿日期:2010-07-15 修回日期:2010-08-23 发布日期:2011-01-12 出版日期:2011-01-01
  • 通讯作者: 余永红
  • 基金资助:
    国家863项目;安徽高校省级自然科学研究重点项目;南京大学计算机软件新技术国家重点实验室开放课题

Integrated security over outsourced database services based on encryption

  • Received:2010-07-15 Revised:2010-08-23 Online:2011-01-12 Published:2011-01-01

摘要: 针对目前外包数据库服务中单方面考虑某种保护技术难以同时满足外包数据库安全需求的不足,提出一种集成数据机密性、数据隐私、用户隐私和访问控制保护的外包数据库服务模型,采用属性分解和部分属性加密技术,基于结合准标识集自动检测技术的近似算法实现外包数据的最小加密属性分解,同时把密码学应用于辅助随机服务器协议,以实现数据库访问时的用户隐私保护和访问控制。理论分析表明,该模型可以提供有效的数据隐私保护和查询处理,较好的用户隐私保护计算复杂度。

关键词: 外包数据库服务, 数据隐私, 访问控制, 加密

Abstract: Privacy requirements have an increasing impact on the real-world applications. Technical considerations and many significant commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. In this paper, we propose a solution to enforce data confidentiality, data privacy, user privacy and access control over outsourced database services. The approach starts from a flexible definition of privacy constraints on a relational schema, applies encryption on information in a parsimonious way and mostly relies on attribute partition to protect sensitive information. Based on the approximation algorithm for the minimal encryption attribute partition with quasi-identifier detection, the approach allow storing the outsourced data on a single database server and minimizing the amount of data represented in encrypted format. Meanwhile,by applying cryptographic technology on the auxiliary random server protocol, the approach can solve the problem of private information retrieval to protect user privacy and access control. The theoretical analysis shows that our new model can provide efficient data privacy protection and query processing, efficient in computational complexity and dose not increase the cost of communication complexity of user privacy protection and access control.

Key words: outsourced database service, data privacy, access control, encryption