计算机科学 ›› 2013, Vol. 40 ›› Issue (11): 140-142.

• 信息安全 • 上一篇    下一篇

面向托管的数据库即服务系统及其隐私保护技术

陈萍,张涛,赵敏,袁志坚,杨兰娟   

  1. 解放军理工大学指挥信息系统学院 南京210007;解放军理工大学指挥信息系统学院 南京210007;解放军理工大学指挥信息系统学院 南京210007;解放军理工大学指挥信息系统学院 南京210007;解放军理工大学指挥信息系统学院 南京210007
  • 出版日期:2018-11-16 发布日期:2018-11-16

Database as Service System for Business Database Application Hosting and its Privacy Preservation Mechanism

CHEN Ping,ZHANG Tao,ZHAO Min,YUAN Zhi-jian and YANG Lan-juan   

  • Online:2018-11-16 Published:2018-11-16

摘要: 数据库即服务(DBaaS)是云计算的一个研究热点,而数据应用托管则是当前DBaaS的一个重要应用领域。针对托管数据隐私保护问题,提出了基于虚拟机和CryptDB系统构建支持多副本的多租户数据托管方法及相应的数据库即服务系统,该系统实现了托管数据的隔离和加密存储并且能基于加密数据执行SQL查询。相关实验表明,和全同态加密系统相比,系统具有较低的性能损耗,较好地解决了隐私保护和实用性问题。

关键词: 数据库即服务,隐私保护,CryptDB,虚拟机

Abstract: Database as a Service(DBaaS) is becoming a research hotspot of cloud computing,as a main application domain,business database application hosting puts forward the requirements of isolation and privacy preservation on hosting data.To satisfy this requirement,this paper proposed a virtual machine based database hosting method and corresponding DBaaS system based on CryptDB.This system has realized the hosting data encrypted storage and can execute SQL queries based on encrypted data.The experiment shows that compared with fully homomorphic encryption system,the performance of the system has lower loss,and better solve the issue of privacy protection and practical.

Key words: Database as a service,Privacy preservation,CryptDB,Virtual machine

[1] Ashraf A.Deploying database appliances in the cloud[J].IEEE Data Engineering Bullentin,2009,2(1):13-20
[2] Popa R A,Redfield C M S,Zeldovich N,et al.CryptDB:Protecting Confidentiality with Encrypted Query Processing[C]∥Proceedings of the 23rd ACM Symposium on Operating Systems Principles(SOSP 2011).Cascais,Portugal,October 2011
[3] Boldyreva A,Chenette N,Lee Y,et al.Order preserving sym-metric encryption[C]∥Proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT).Cologne,Germany,April 2009
[4] Paillier P.Public-key cryptosystems based on composite degree residuosity classes[C]∥Proceedings of the 18th Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT).Prague,Czech Republic,May 1999
[5] Song D X,Wagner D,Perrig A.Practical techniques for searches on encrypted data[C]∥Proceedings of the 21st IEEE Sympo-sium on Security and Privacy.Oakland,CA,May 2000
[6] 王卓昊,王希诚.面向托管的数据库即服务系统及资源优化技术[J].计算机工程与应用,2011,47(27):19-23

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!