Information and Communications Technology and Policy

Information and Communications Technology and Policy

Information and Communications Technology and Policy ›› 2023, Vol. 49 ›› Issue (2): 65-74.doi: 10.12267/j.issn.2096-5931.2023.02.011

Previous Articles     Next Articles

Database lifecycle protection method based on privacy calculation

DAI Weitao, YU Jinhao, TIAN Wensheng, FAN Jiafeng, WANG Zedong, LU Yifan, YAN Zhichao, TANG Panpan   

  1. Nanhu Lab, Big Data Technolgy Research Center, Jiaxing 314000, China
  • Received:2022-12-11 Online:2023-02-25 Published:2023-03-20

Abstract:

In recent years, with the rapid development of big data, data leakage incidents have occurred constantly, and data security has been paid more and more attention. The hardware-based chip-level privacy computing uses the chip security base to ensure the data security of upper-layer applications, and has become an effective data security solution. This paper proposes a privacy-based computing-based database life cycle protection method. We design a new key management service system (Key Management Service, KMS). Encryption to ensure the security of the private data throughout the entire life cycle (storage, transmission, and use). Compared with database operations in ordinary computing, this solution has a performance loss of about 30% in read and write operations in the MySQL database system, and about 8 seconds in read and write operations in the SQLCipher database system.

Key words: Intel SGX, KMS, SQLCipher, privacy calculation, database

CLC Number: