Proceedings of the International Conference on Information Economy, Data Modeling and Cloud Computing, ICIDC 2022, 17-19 June 2022, Qingdao, China

Research Article

A Heterogeneous Database Encryption Algorithm Based on B/S Structure

Download166 downloads
  • @INPROCEEDINGS{10.4108/eai.17-6-2022.2322707,
        author={Jun  Chen and Feng  Zhang},
        title={A Heterogeneous Database Encryption Algorithm Based on B/S Structure},
        proceedings={Proceedings of the International Conference on Information Economy, Data Modeling and Cloud Computing, ICIDC 2022, 17-19 June 2022, Qingdao, China},
        publisher={EAI},
        proceedings_a={ICIDC},
        year={2022},
        month={10},
        keywords={b/s structure; heterogeneous database; encryption; data protection},
        doi={10.4108/eai.17-6-2022.2322707}
    }
    
  • Jun Chen
    Feng Zhang
    Year: 2022
    A Heterogeneous Database Encryption Algorithm Based on B/S Structure
    ICIDC
    EAI
    DOI: 10.4108/eai.17-6-2022.2322707
Jun Chen1,*, Feng Zhang2
  • 1: Wuhan Textile University
  • 2: Wistron ITS.
*Contact email: 2010034@wtu.edu.cn

Abstract

In order to solve the problem that the key of the traditional method is uneven between the user and the authority center, which leads to the long encryption time of a heterogeneous database, a heterogeneous database encryption algorithm based on the B/S structure is proposed. By comparing the advantages and disadvantages of the C/S structure and B/S structure, the framework of heterogeneous database encryption based on the B/S structure is constructed. Based on the encryption architecture framework of the B/S structure, the key management mechanism is given, and the key of the authority management center at all levels in the server user information management system is generated, as well as the user's key and the user's master key in the corresponding authority center. Combined with the access policy tree encryption to calculate the plaintext data on the server-side of the heterogeneous database, the data that need to be protected is converted into ciphertext form, and the heterogeneous database encryption is completed. The simulation results show that the proposed algorithm can effectively complete the heterogeneous database encryption and protect the database security, and the response time to each service of the database server is shorter than the encryption algorithm compared with the experiment.