Computer Science ›› 2016, Vol. 43 ›› Issue (4): 145-149.doi: 10.11896/j.issn.1002-137X.2016.04.029

Previous Articles     Next Articles

Mobile Data Storage Solution Based on Secret Sharing Protocol

RAN Juan and LI Xiao-yu   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Taking into account the limited resource and capability for mobile database,a mobile data storage solution based on secret sharing protocol was proposed.Lightweight main memory database is used in application to store a small amount of data.Then,the most data of the mobile client are stored in the database server.Sensitive data are stored on the data encryption server by using AES encrypting,and secret key is split by secret sharing technology and stored in different data storage servers,which guarantees that only the mobile client can get both the secret key and the cipher text,reducing the storage pressure of mobile client.The solution achieves the separation of data control permissions,ensuring the mobile client access to data with the hightest authority,improving the security of the data.The experiment results show that the solution is feasible with good performance and has good application prospects.

Key words: Mobile computing,Data storage,Data security,Secret sharing protocol,AES

[1] China internet network information center.Statistical report on the development of China Internet Network in the thirty-fourth time[R/OL].2014. Chinese) 中国互联网络信息中心.第34次中国互联网络发展状况统计报告[R/OL].2014.
[2] Wu W W,Chen S Y.Research and Development Trend about Eembed Mobile Data Base[J].Computer Science,2005,32(12):88-90(in Chinese) 吴娓娓,陈蜀宇.嵌入式移动数据库现状与发展趋势[J].计算机科学,2005,32(12):88-90
[3] Amja A M,Obaid A,Seguin N.A Distributed Mobile Database Architecture[C]∥ 2011 IEEE Asia-Pacific Conference on Services Computing.2011:62-69
[4] Ying Y,Ren K.Research on mobile database key technologiesand application[J].Microcomputer Information,2010,10(2):89-90(in Chinese) 应毅,任凯.微终端移动数据库关键技术及其应用研究[J].微计算机信息,2010,10(2):89-90
[5] Wang J D.Design and implementment of database encryptionsystem based on advanced data encrytion standard AES[D].Xi’an:Xidian University,2011(in Chinese) 王劲东.基于高级数据库加密标准AES的数据库加密技术研究与实现[D].西安:西安电子科技大学,2011
[6] Shamir A.How to Share a Secret[J].Communication of theACM,1979,2(11):612-613
[7] Hu Z H,Tan Z P,Zhang Q.Novel Method for Impossible Differential Cryptanalysis of 9-Round AES_256 [J].Computer Science,2014,41(8):196-198(in Chinese) 胡志华,覃中平,张青.一种新的9轮AES_256不可能差分分析[J].计算机科学,2014,41(8):196-198
[8] Zhang J H,Guo X B,Fu X.AES encryption algorithm and the application in information security[J].The Security of Information Network,2011(5):32-33(in Chinese) 张金辉,郭晓彪,符鑫.AES加密算法分析及其在信息安全中的应用[J].信息网络安全,2011(5):32-33
[9] Jiang L L.Research of Rational Secret Sharing Technology[D].Harbin:Harbin Normal University,2011(in Chinese) 江林临.理性秘密共享技术研究[D].哈尔滨:哈尔滨师范大学,2011
[10] Li S Y,Shi R H.A Dynamic Secret Key Sharing Scheme[J].Journal of Anhui University (Natural Science Edition),2010,4(3):38-42(in Chinese) 李素云,石润华.一种动态的密钥分存方案[J].安徽大学学报(自然科学版),2010,4(3):38-42
[11] Zhou Z Y,Liu S J,Wang Z Y,et al.Implementation of a Thre-shold Encryption Scheme[J].Modern Computer,2009(11):41-44(in Chinese) 周振宇,刘少军,王子燕,等.一种门限加密方案的实现[J].现代计算机(专业版),2009(11):41-44
[12] Xu M,Cao J N,Peng W.Mobile computing technology[M].Beijing:Tsinghua University Press,2008:12-13(in Chinese) 徐明,曹建农,彭伟.移动计算技术[M].北京:清华大学出版社,2008:12-13
[13] Pu Y Y,Pei Q J,Li H Y.Exploiting the Performance-EnergyTradeoffs for Mobile Databa[J].Journal of Universal Computer Science,2014,0(20):1488-1498
[14] Lan Li-na,Mao Jing-li,Gou Xue-rong.A Novel LightweightMain Memory Database for Telecom Network Performance Management System[J].Journal of Networks,2012,7(4):667-674
[15] Quan Y,He M.Application and implementation of servers loadbalance[J].Microcomputer Applications,2006,27(4):433-435(in Chinese) 全宇,何苗.服务器负载均衡的应用与实现[J].微计算机应用,2006,27(4):433-435
[16] Cheng B.Design and Implementation of Load Balancing Scheduling System[D].Wuhan:Huazhong University of Science and Technology,2011(in Chinese) 程斌.负载均衡调度系统的设计与实现[D].武汉:华中科技大学,2011

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .