Dissertation > Excellent graduate degree dissertation topics show

The Design and Implementation of a Database Encryption System Based on Identity Authentication

Author: ZhangXiaoNa
Tutor: LuJianZhu
School: Jinan University
Course: Applied Computer Technology
Keywords: database encryption symmetric encryption public-key encryption identity authentication
CLC: TP309.7
Type: Master's thesis
Year: 2008
Downloads: 216
Quote: 2
Read: Download Dissertation


The erosion of trust put in traditional database servers and in Database Service Providers and the growing interest for different forms of selective data dissemination are different factors that lead to move the access control from servers to clients.Different data encryption and key dissemination schemes have been proposed to serve this purpose.Based on the symmetric encryption and a public-key encryption based on elliptic curves,a hybrid encryption scheme was proposed in paper[5]to make the database field security classification possible and practical.In his constructions,the sensitive data-items of database are divided into multilevel security in accordance with their security demand,and the sensitive data at each level is encrypted by the symmetric encryption algorithm,then these different symmetric encryption keys are protected by the public-key encryption.Thus,allowing different privileges are exercised by different users on the same encrypted content.However,the server has to store two values(C1(i),C2(i)) for every user Ui in order to derive the symmetric encryption keys for Ui’s authorization data-items.In this thesis,a new database hybrid encryption scheme comprising of both identity authentication and encryption technology is presented.Our constructions derive from a novel application of paper[5]’s scheme,and can significantly decrease the space cost by using the following strategy.In order to make every user Ui to derive the symmetric encryption keys for his/her authorization data-items,the server only stores the value C2(i).Moreover,an identity authentication protocol concerned with verifying proof of an asserted identity is designed,whose security is based on solving the elliptic curve discrete logarithm problem.

Related Dissertations

  1. The Research of Hubei Medical Card Mode and Information Platform,R197.1
  2. Design of a Safety Management System and the Implement of Security Strategy,TP393.08
  3. Research on Monitoring and Tracing Secret Documents of Mobile Storage Devices,TP309.2
  4. The Design and Implementation of the Dual Factors Identity Authentication Based on ECC,TP393.08
  5. Study on Safety Mechanism of Soldier Administrator System,TP309
  6. Digital Campus Information System Design and Implementation,TP311.52
  7. The Design and Implementation of the Database Encryption System,TP311.13
  8. Database for Encryption and Decryption Key Technology Research,TP309.7
  9. Design and Analysis on Authenticated Key Agreement Protocol of the WiMAX Network,TN92
  10. Research and Implementation of Unified Identiy Authentiation System,TP393.08
  11. Design and Realization of Verification Code Based on USBKey,TP393.08
  12. The Sanmenxia secondary teaching management system design and implementation,TP311.52
  13. Research on Authentication and Encryption Technology of Communication System Based on STM32,TN918.82
  14. Research and Design of the Database Encryption Techniques Base on B/S Structure,TP309.7
  15. The Research on Database Encryption Algorithm and Key Technology,TP309.7
  16. Cash Funds Box Data Acquisition and Flow Process Management Design,TP274.2
  17. Research on Public-key Encryption Based on Chaos,TN918.1
  18. Niederreiter error-correcting codes based on public-key cryptosystem,TN918.1
  19. Research and Realization of the Secure E-Mail System Based on PKI,TP393.098
  20. Database access, encryption, and universal interface design and implementation,TP311.13
  21. Research and Implementation of Scalar Multiplication Algorithms and Mixed Encryption on Conic Curve over F2m,TN918.1

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality > Encryption and decryption
© 2012 www.DissertationTopic.Net  Mobile