The key management of the encrypted database based on XML

被引:0
|
作者
Zhang, Yong [1 ,2 ]
Song, Qin-tao [2 ]
Niu, Xia-mu [1 ,3 ]
机构
[1] Shenzhen Tech Innovat Int, Shenzhen Key Lab Network Informat Wiring, Guangdong 518057, Peoples R China
[2] Harbin Inst Technol, Shenzhen Grad Sch, Harbin 518055, Guangdong, Peoples R China
[3] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 151001, Heilongjiang, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Encryption is an effective way to enhance the security of the database. The key management is the important factor to ensure the security of the encrypted database. But the current scheme of the key management has some security problem and is easily attacked. Face to this problem, the new scheme about key management base on XML is proposed in this paper. A XML file that has the tree structure is used to mange the working key that is protected by the primary key. It can not only manage the working key efficiently, but also enhance the security of the encrypted database.
引用
收藏
页码:229 / +
页数:2
相关论文
共 50 条
  • [41] Research on Encrypted Traffic Detection Based on Key Features
    Chen, Fangjie
    Bai, Jingpeng
    Gao, Weihan
    [J]. IEEE ACCESS, 2024, 12 : 1786 - 1793
  • [42] Non-order-preserving Index for Encrypted Database Management System
    Wong, Wai-Kit
    Wong, Kwok-Wai
    Yue, Ho-Yin
    Cheung, David W.
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2017, PT II, 2017, 10439 : 190 - 198
  • [43] A reused key attack on an encrypted mobile app database: Case study on KakaoTalk and ProtonMail
    Hur, Uk
    Park, Myungseo
    Kim, Jongsung
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
  • [44] Research on Management Information System for Construction Market based on XMLHttp plus XML Database Synchronization
    Feng, Zhijiang
    Liu, Jianchen
    Wang, Limin
    Zhang, Hongliang
    Zhang, Ping
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1634 - 1637
  • [45] Management of XML documents without schema in relational database systems
    Kudrass, T
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2002, 44 (04) : 269 - 275
  • [46] Lightweight multigranularity locking for transaction management in XML database systems
    Choi, YG
    Moon, SC
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 78 (01) : 37 - 46
  • [47] Attribute-based Queries over Outsourced Encrypted Database
    Jiang, Zoe L.
    Huang, Jiajun
    Liu, Zechao
    Wang, Xuan
    [J]. 2017 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2017, : 164 - 168
  • [48] Information Processing for Encrypted Database
    Sun, Ruxia
    Yin, Chunyong
    [J]. ACC 2009: ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2009, : 252 - 255
  • [49] Updating encrypted XML documents on untrusted machines
    Reddy, P
    Mayo, RN
    O'Brien-Strain, E
    Rowson, J
    Xiong, YH
    [J]. SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 425 - 439
  • [50] A security analysis for encrypted database
    Mingsheng, Zhang
    Chunyong, Yin
    [J]. 2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 987 - 990