Journal of Computer Applications ›› 2024, Vol. 44 ›› Issue (9): 2791-2801.DOI: 10.11772/j.issn.1001-9081.2023091362
• Cyber security • Previous Articles Next Articles
Xudong LI1,2,3, Yukang FENG1,3(), Junsheng CHEN1,3
Received:
2023-10-10
Revised:
2023-12-18
Accepted:
2023-12-20
Online:
2024-03-21
Published:
2024-09-10
Contact:
Yukang FENG
About author:
LI Xudong,born in 1975,Ph. D., associate professor. His research interests include operating system,database,distributed computing.通讯作者:
冯宇康
作者简介:
李旭东(1975—),男,吉林松原人,副教授,博士,主要研究方向:操作系统、数据库、分布式计算CLC Number:
Xudong LI, Yukang FENG, Junsheng CHEN. Multi-key page-level encryption system for SQLite[J]. Journal of Computer Applications, 2024, 44(9): 2791-2801.
李旭东, 冯宇康, 陈俊升. 面向SQLite的多密钥页级别加密系统[J]. 《计算机应用》唯一官方网站, 2024, 44(9): 2791-2801.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2023091362
预留接口 | 接口功能 |
---|---|
sqlite3_key(sqlite3* db, const void* pKey, int nKey) | 指定数据库加密的密钥 |
sqlite3_rekey(sqlite3* db, const void* pKey, int nKey) | 重设加密密钥 |
sqlite3CodecGetKey(sqlite3* db, int nDB,void** Key, int* nKey) | 返回指定数据库的密钥 |
sqlite3CodecAttach(sqlite3* db, int nDB. const void* pKey, int nKey) | 密钥与数据库建立关联 |
Tab. 1 SQLite reserved encryption interfaces
预留接口 | 接口功能 |
---|---|
sqlite3_key(sqlite3* db, const void* pKey, int nKey) | 指定数据库加密的密钥 |
sqlite3_rekey(sqlite3* db, const void* pKey, int nKey) | 重设加密密钥 |
sqlite3CodecGetKey(sqlite3* db, int nDB,void** Key, int* nKey) | 返回指定数据库的密钥 |
sqlite3CodecAttach(sqlite3* db, int nDB. const void* pKey, int nKey) | 密钥与数据库建立关联 |
软件资源名称 | 软件版本 | 软件资源名称 | 软件版本 |
---|---|---|---|
Ubuntu | 20.04.1 | Make | 4.2.1 |
OpenSSL | 1.1.1 | SQLite | 3.39.2 |
GCC | 9.4.0 | SQLCipher | 4.5.2 |
Tab. 2 Software testing environment
软件资源名称 | 软件版本 | 软件资源名称 | 软件版本 |
---|---|---|---|
Ubuntu | 20.04.1 | Make | 4.2.1 |
OpenSSL | 1.1.1 | SQLite | 3.39.2 |
GCC | 9.4.0 | SQLCipher | 4.5.2 |
测试硬件环境 | 型号 | 核数或容量 |
---|---|---|
CPU | Intel Core i5-8300H | 8 核 |
RAM | DDR4 | 8 GB |
磁盘 | SSD | 512 GB |
Tab. 3 Hardware testing environment
测试硬件环境 | 型号 | 核数或容量 |
---|---|---|
CPU | Intel Core i5-8300H | 8 核 |
RAM | DDR4 | 8 GB |
磁盘 | SSD | 512 GB |
测试类型 | SQL语句 |
---|---|
新增测试 | insert into movie_rating values(1,1, 'Toy Story (1995)',4.5); |
读取测试 | select * from movie_rating where id = 1; |
修改测试 | update movie_rating set userId=1, movie='Toy Story (1995)', rating=4.5 where id = 2; |
删除测试 | delete from movie_rating where id = 1; |
Tab. 4 Examples of SQL statements for testing
测试类型 | SQL语句 |
---|---|
新增测试 | insert into movie_rating values(1,1, 'Toy Story (1995)',4.5); |
读取测试 | select * from movie_rating where id = 1; |
修改测试 | update movie_rating set userId=1, movie='Toy Story (1995)', rating=4.5 where id = 2; |
删除测试 | delete from movie_rating where id = 1; |
1 | BERTINO E, SANDHU R. Database security-concepts, approaches, and challenges [J]. IEEE Transactions on Dependable and Secure Computing, 2005, 2(1): 2-19. |
2 | SQLite home page [EB/OL]. [2023-01-31]. . |
3 | BHOSALE S T, PATIL T, PATIL P. SQLite: light database system[J]. International Journal of Computer Science and Mobile Computing, 2015, 44(4): 882-885. |
4 | YUE K, JIANG L, YANG L, et al. Research of embedded database SQLite application in intelligent remote monitoring system[C]// Proceedings of the 2010 International Forum on Information Technology and Applications. Piscataway: IEEE, 2010, 2: 96-100. |
5 | XU Y, YANG B, MA S, et al. Research and application of integrated SQLite based on ground meteorological observation [C]// Proceedings of the 2019 International Conference on Meteorology Observations. Piscataway: IEEE, 2019: 1-4. |
6 | SHMUELI E, VAISENBERG R, ELOVICI Y, et al. Database encryption: an overview of contemporary challenges and design considerations [J]. ACM SIGMOD Record, 2010, 38(3): 29-34. |
7 | 赵宝献, 秦小麟. 数据库访问控制研究综述[J]. 计算机科学, 2005, 32(1): 88-91. |
ZHAO B X, QIN X L. A survey on the database access controls [J]. Computer Science, 2005, 32(1): 88-91. | |
8 | 褚龙现. SQLite数据库加密的分析与设计[J]. 电子设计工程, 2014, 22(16): 191-193. |
CHU L X. The analysis and design of SQLite database encryption [J]. Electronic Design Engineering, 2014, 22(16): 191-193. | |
9 | WANG Y, SHEN Y, SU C, et al. CryptSQLite: SQLite with high data security [J]. IEEE Transactions on Computers, 2020, 69(5): 666-678. |
10 | 何文才, 马鹏斐, 刘培鹤, 等. 基于Android平台的SQLite数据库加密研究[J]. 计算机应用与软件, 2019, 36(10): 310-315. |
HE W C, MA P F, LIU P H, et al. SQLite database encryption based on Android platform[J]. Computer Applications and Software, 2019, 36(10): 310-315. | |
11 | 吴良波, 金连甫. 离线应用本地数据存储设计与实现[J]. 计算机工程与设计, 2010, 31(6): 1236-1239. |
WU L B, JIN L F. Design and implementation of local data storage for offline application [J]. Computer Engineering and Design, 2010, 31(6): 1236-1239. | |
12 | AKOWUAH F, AHLAWAT A, DU W. Protecting sensitive data in Android SQLite databases using TrustZone [EB/OL]. [2023-11-10]. . |
13 | MUTTI S, BACIS E, PARABOSCHI S. SeSQLite: Security enhanced SQLite: mandatory access control for Android databases[C]// Proceedings of the 31st Annual Computer Security Applications Conference. New York: ACM, 2015: 411-420. |
14 | Zetetic. SQLcipher [DS/OL]. [2023-06-21]. . |
15 | 李征宇, 陈磊. 数据库性能评测指标及其测试方法研究[J]. 电子设计工程, 2011, 19(4): 4-5. |
LI Z Y, CHEN L. Research on the testing method and performance evaluating and testing for database [J]. Electronic Design Engineering, 2011, 19(4): 4-5. | |
16 | 廖顺和, 乐嘉锦. 嵌入式数据库SQLite加密方法分析与研究[J]. 计算机应用与软件, 2008, 25(10): 70-71. |
LIAO S H, LE J J. Analysis and research of the encryption method for SQLite [J]. Computer Applications and Software, 2008, 25(10): 70-71. | |
17 | 张烨平. 可验证完整性的加密SQLite技术研究与实现[D]. 西安:西安电子科技大学, 2021:36. |
ZHANG Y P. Research and implementation of encrypted SQLite technology with integrity verification[D]. Xi’an: Xidian University, 2021:36. | |
18 | O’NEIL E J, O’NEIL P E, WEIKUM G. The LRU-K page replacement algorithm for database disk buffering [J]. ACM SIGMOD Record, 1993, 22(2): 297-306. |
19 | Grouplens. MovieLens [DS/OL]. [2023-04-30]. . |
20 | TPC. Transaction processing performance council [DS/OL]. [2023-07-30]. . |
[1] | HAN Si, ZHENG Baokun, CAO Qimin. Logical key hierarchy plus based key management program for wireless sensor network [J]. Journal of Computer Applications, 2019, 39(5): 1378-1384. |
[2] | ZHOU Yang, WU Qiwu, JIANG Lingzhi. Group key management scheme based on distributed path computing element in multi-domain optical network [J]. Journal of Computer Applications, 2019, 39(4): 1095-1099. |
[3] | SONG Tianyu, YANG Geng. Design and implementation of middleware system for ciphertext database [J]. Journal of Computer Applications, 2018, 38(12): 3450-3454. |
[4] | LI Chengwen, WANG Xiaoming. Outsourced data encryption scheme with access privilege revocation [J]. Journal of Computer Applications, 2016, 36(1): 216-221. |
[5] | WANG Binbin ZHANG Yanyan ZHANG Xuelin. Mixed key management scheme based on domain for wireless sensor network [J]. Journal of Computer Applications, 2014, 34(1): 90-94. |
[6] | LUO Wenjun XU Min. Attribute-based encryption and re-encryption key management in cloud computing [J]. Journal of Computer Applications, 2013, 33(10): 2832-2834. |
[7] | ZHANG Min-qing FU Wen-hua WU Xu-guang. Key management scheme based on composite design and identity encryption for clustered wireless sensor networks [J]. Journal of Computer Applications, 2012, 32(05): 1392-1396. |
[8] | WU Qiu-lin LI Qiao-liang. Secure management of continuity key pre-distribution scheme based on SBIBD [J]. Journal of Computer Applications, 2012, 32(04): 960-963. |
[9] | SUN Mei ZHAO Bing. Identity-based key management scheme for Ad Hoc network [J]. Journal of Computer Applications, 2012, 32(01): 104-106. |
[10] | CAO Shuai ZHANG Chuan-rong SONG Cheng-yuan. Self-healing group key management scheme with collusion resistance [J]. Journal of Computer Applications, 2011, 31(10): 2692-2693. |
[11] | Quan-di WANG Jin-feng LI Jie ZHOU. Modification of Cao's multicast key management scheme based on generalized cat map [J]. Journal of Computer Applications, 2011, 31(04): 975-977. |
[12] | Shi-wei HUO Zhong-min CAI Chang-yuan LUO. Identity-based group key management scheme in pervasive computing environment [J]. Journal of Computer Applications, 2011, 31(04): 981-983. |
[13] | JIKE Lin-hao YANG Jun. Security analysis of "zero rekeying" scheme based on multi-cast RSA [J]. Journal of Computer Applications, 2011, 31(03): 793-797. |
[14] | . Join-tree-based contributory group key management scheme for key update [J]. Journal of Computer Applications, 2011, 31(01): 143-146. |
[15] | Song XIE Zhong-wen GUO Hai-peng QU Guang-peng Lü. Key management scheme for wireless sensor network based on multiple key spaces [J]. Journal of Computer Applications, 2009, 29(4): 932-934,. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||