CN116796355A - Data security protection and leakage prevention production method for data warehouse - Google Patents

Data security protection and leakage prevention production method for data warehouse Download PDF

Info

Publication number
CN116796355A
CN116796355A CN202311071390.7A CN202311071390A CN116796355A CN 116796355 A CN116796355 A CN 116796355A CN 202311071390 A CN202311071390 A CN 202311071390A CN 116796355 A CN116796355 A CN 116796355A
Authority
CN
China
Prior art keywords
names
field
data
encryption
encryption algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311071390.7A
Other languages
Chinese (zh)
Inventor
元庚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Shudui Technology Co ltd
Original Assignee
Jiangsu Shudui Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Shudui Technology Co ltd filed Critical Jiangsu Shudui Technology Co ltd
Priority to CN202311071390.7A priority Critical patent/CN116796355A/en
Publication of CN116796355A publication Critical patent/CN116796355A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data security protection and leakage prevention production method for a data warehouse, which comprises the following steps: selecting a symmetric encryption algorithm as an encryption pool of a database, wherein the encryption pool adopts meaningless codes to represent a real encryption algorithm; the table name and the field name are used as basic keys, a hash algorithm is selected to convert the basic keys into table digests, and the table digests are used as actual keys; the system obtains table names and field name information according to metadata of a database table, generates an actual secret key corresponding to a field, randomly selects an encryption algorithm, encrypts different fields, and records the table names, the field names and codes of the encryption algorithm corresponding to the table names and the field names into a configuration information table; in the decryption process, the system scans SQL sentences, identifies table names and field names, reads information in a configuration information table to acquire an encryption algorithm used by the field, calls a decryption method, and carries out a hash algorithm on the table names and the field names to acquire an actual key; the method has the characteristic of high safety.

Description

Data security protection and leakage prevention production method for data warehouse
Technical Field
The invention relates to the field of data security protection, in particular to a data security protection anti-leakage generation method for a data warehouse.
Background
In recent years, the security legislation is continuously increased in China. From national security law, network security law, cryptography, data security law, personal information protection law and the like, china enters the law curing stage in the field of government affair data management, and information protection is implemented on the whole life cycle of government affair data according to law.
Each level of government builds a basic library about population and legal persons, and establishes data classification standards in terms of data security. In practice, hierarchical classification only solves the problems of level identification of data acquisition objects and data acquisition range, but does not solve the problem of leakage prevention of data in the development, exchange and circulation processes. The existing protection means generally have the following problems: the whole database encryption key is fixed and not dynamic, so that the whole database encryption key is easy to crack; the encrypted results of the same information in different tables are the same, so that multiple tables can correlate other information; the encryption algorithm is single, and multiple secret algorithms are not supported at the same time; the fused table model only has one decryption algorithm and does not support a plurality of decryption algorithms. Therefore, a method for guaranteeing the safety is urgently needed, and the safety problem of data in the development, exchange and circulation processes is avoided.
Disclosure of Invention
In order to achieve the above object, the present inventors provide a data security protection and leakage prevention production method for a data warehouse, comprising the steps of:
s1, selecting a symmetric encryption algorithm as an encryption pool of a database, wherein the encryption pool adopts meaningless codes to represent a real encryption algorithm;
s2, adopting a table name and a field name as basic keys, then selecting a hash algorithm to convert the basic keys into table digests, and taking the table digests as actual keys of an encryption algorithm, wherein the table digests have irreversibility;
s3, the system obtains table names and field name information according to metadata of the database table, generates an actual secret key corresponding to the field, randomly selects an encryption algorithm from an encryption pool, encrypts different fields, and finally records the table names, the field names and codes of the encryption algorithm corresponding to the table names and the field names into a configuration information table;
s4, when the data is processed, the data needs to be decrypted, in the decryption process, the system scans SQL sentences, identifies the used table names and field names, reads information in the configuration information table to acquire an encryption algorithm used by the field, then invokes a decryption method of the algorithm, and automatically carries out a hash algorithm on the table names and field names to obtain an actual key so as to decrypt the data.
As a preferred mode of the present invention, the encryption algorithm in step S1 includes: DES, 3DES, AES and RC4.
As a preferred mode of the present invention, the step S2 includes: the table names and the field names are unique in the database, and the actual key has global uniqueness.
As a preferred mode of the present invention, the step S3 includes: all actual keys need not be saved.
As a preferred mode of the present invention, the step S4 includes: the decryption process modifies the SQL statement through the bottom layer.
Compared with the prior art, the beneficial effects achieved by the technical scheme are as follows:
the method generates encrypted data by combining the characteristics of a database through an international authentication symmetric encryption algorithm. The method designs a dynamic key, supports the selection of a plurality of different encryption algorithms, and the selected plurality of different encryption algorithms can be mixed and used in data encryption, so that encryption becomes irregular, and the difficulty of cracking is increased; different fields of the same information in the same table or different tables can be encrypted into different results, so that the data is prevented from being associated, and even if two tables with mapping relations are leaked, the encrypted results are not associated. The encrypted data can be automatically analyzed and decrypted in the using and processing process, the stored result is still an encrypted value, the data result of multiple tables is fused, and no substantial relation is formed between the data result and the ciphertext of the source table; even if the whole database is dragged away, not only can the main body information be prevented from being identified, but also the system information associated by the multiple tables is not available.
Drawings
FIG. 1 is a flow chart of a method according to an embodiment.
Detailed Description
In order to describe the technical content, constructional features, achieved objects and effects of the technical solution in detail, the following description is made in connection with the specific embodiments in conjunction with the accompanying drawings.
The embodiment provides a data security protection and leakage prevention production method for a data warehouse, which comprises the following steps:
s1, selecting a symmetric encryption algorithm as an encryption pool of a database, wherein the encryption pool adopts meaningless codes to represent a real encryption algorithm; specific: the symmetric encryption algorithm of international authoritative certification is selected as the encryption pool of the system, such as DES, 3DES, AES, RC4 and the like, and the realization functions are as follows
Encryption: ciphertext = algorithm (key, plaintext);
decryption: plaintext=algorithm (key, ciphertext);
the encryption pool adopts meaningless codes to represent a real encryption algorithm, such as: a1 represents DES, S3 represents RC4, and is prevented from being guessed.
S2, adopting a table name and a field name as basic keys, then selecting a hash algorithm to convert the basic keys into table digests, and taking the table digests as actual keys of an encryption algorithm, wherein the table digests have irreversibility; specific: the unique characteristic of the database object is used as a key, such as: the table names in the database cannot be the same, and the field names in the same table cannot be the same, so that the table name plus the field name are unique in the whole database; therefore, the table name and the field name are used as basic keys, then a hash algorithm is selected to convert the basic keys into table digests, and the digests are used as actual keys of the encryption algorithm because the digests are irreversible, and the actual keys have global uniqueness because the table name and the field name are unique in a database.
S3, the system obtains table names and field name information according to metadata of a database table, generates actual secret keys corresponding to fields, randomly selects an encryption algorithm in an encryption pool, encrypts different fields, and finally records codes of the table names, the field names and the corresponding encryption algorithms into a configuration information table without storing all the actual secret keys because the fields with the same names and the same contents are scattered in different tables;
s4, when the data is processed, the data needs to be decrypted, in the decryption process, the system scans SQL sentences, identifies the used table names and field names, reads information in a configuration information table to acquire an encryption algorithm used by the field, then invokes a decryption method of the algorithm, and automatically carries out a hash algorithm on the table names and field names to obtain an actual key so as to decrypt the data; the whole process modifies SQL sentences through the bottom layer, so that the writing method of the conventional SQL is not influenced, and encryption and decryption can be realized without perception to users.
The embodiment uses an encryption and decryption algorithm of international authentication, so that the safety is guaranteed, and the cost is low; the data security is reinforced, and once the data is leaked, the data is not available; the encryption algorithm is hidden, the secret key is not stored, and the difficulty of being cracked is extremely high; the user does not feel in the encryption and decryption process; even if the configuration information of the system is compromised, the third party cannot be decrypted due to the hidden key algorithm.
It should be noted that, although the foregoing embodiments have been described herein, the scope of the present invention is not limited thereby. Therefore, based on the innovative concepts of the present invention, alterations and modifications to the embodiments described herein, or equivalent structures or equivalent flow transformations made by the present description and drawings, apply the above technical solution, directly or indirectly, to other relevant technical fields, all of which are included in the scope of the invention.

Claims (5)

1. The data security protection and leakage prevention production method for the data warehouse is characterized by comprising the following steps of:
s1, selecting a symmetric encryption algorithm as an encryption pool of a database, wherein the encryption pool adopts meaningless codes to represent a real encryption algorithm;
s2, adopting a table name and a field name as basic keys, then selecting a hash algorithm to convert the basic keys into table digests, and taking the table digests as actual keys of an encryption algorithm, wherein the table digests have irreversibility;
s3, the system obtains table names and field name information according to metadata of the database table, generates an actual secret key corresponding to the field, randomly selects an encryption algorithm from an encryption pool, encrypts different fields, and finally records the table names, the field names and codes of the encryption algorithm corresponding to the table names and the field names into a configuration information table;
s4, when the data is processed, the data needs to be decrypted, in the decryption process, the system scans SQL sentences, identifies the used table names and field names, reads information in the configuration information table to acquire an encryption algorithm used by the field, then invokes a decryption method of the algorithm, and automatically carries out a hash algorithm on the table names and field names to obtain an actual key so as to decrypt the data.
2. The method for producing the data security protection and leakage prevention of the data warehouse according to claim 1, wherein the encryption algorithm in the step S1 comprises: DES, 3DES, AES and RC4.
3. The data warehouse data security protection leak-proof production method as defined in claim 1, wherein the step S2 comprises: the table names and the field names are unique in the database, and the actual key has global uniqueness.
4. The data warehouse data security protection leak-proof production method as claimed in claim 1, wherein the step S3 includes: all actual keys need not be saved.
5. The data warehouse data security protection leak-proof production method as defined in claim 1, wherein the step S4 comprises: the decryption process modifies the SQL statement through the bottom layer.
CN202311071390.7A 2023-08-24 2023-08-24 Data security protection and leakage prevention production method for data warehouse Pending CN116796355A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311071390.7A CN116796355A (en) 2023-08-24 2023-08-24 Data security protection and leakage prevention production method for data warehouse

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311071390.7A CN116796355A (en) 2023-08-24 2023-08-24 Data security protection and leakage prevention production method for data warehouse

Publications (1)

Publication Number Publication Date
CN116796355A true CN116796355A (en) 2023-09-22

Family

ID=88037621

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311071390.7A Pending CN116796355A (en) 2023-08-24 2023-08-24 Data security protection and leakage prevention production method for data warehouse

Country Status (1)

Country Link
CN (1) CN116796355A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143159A (en) * 2011-01-13 2011-08-03 北京邮电大学 Database key management method in DAS (database-as-a-service) model
CN102855448A (en) * 2012-08-10 2013-01-02 深圳市黎明网络系统有限公司 Field-level database encryption device
CN108009440A (en) * 2017-11-23 2018-05-08 重庆金融资产交易所有限责任公司 Date storage method, querying method, device, storage medium and computer equipment
CN111767559A (en) * 2020-06-23 2020-10-13 江苏荣泽信息科技股份有限公司 Field level encryption blockchain data
CN111884986A (en) * 2019-12-13 2020-11-03 马上消费金融股份有限公司 Data encryption processing method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143159A (en) * 2011-01-13 2011-08-03 北京邮电大学 Database key management method in DAS (database-as-a-service) model
CN102855448A (en) * 2012-08-10 2013-01-02 深圳市黎明网络系统有限公司 Field-level database encryption device
CN108009440A (en) * 2017-11-23 2018-05-08 重庆金融资产交易所有限责任公司 Date storage method, querying method, device, storage medium and computer equipment
CN111884986A (en) * 2019-12-13 2020-11-03 马上消费金融股份有限公司 Data encryption processing method and device
CN111767559A (en) * 2020-06-23 2020-10-13 江苏荣泽信息科技股份有限公司 Field level encryption blockchain data

Similar Documents

Publication Publication Date Title
CN103731432B (en) Multi-user supported searchable encryption method
CN101436208B (en) Ciphertext database privacy protection enquiring method
KR101371608B1 (en) Database Management System and Encrypting Method thereof
CN112380557B (en) Relational database encryption method and encrypted database query method
CN103378971B (en) A kind of data encryption system and method
CN101043326B (en) Dynamic information encrypting system and method
GB2484382A (en) Generating a test database for testing applications by applying format-preserving encryption to a production database
CN110166423B (en) User credit determination method, device and system and data processing method
CN111177769A (en) Private data protection list query method and related list query system
CN111191289A (en) Method for displaying and storing private data
CN108090370A (en) Instant messaging encryption method and system based on index
CN111510464B (en) Epidemic situation information sharing method and system for protecting user privacy
CN112529586B (en) Transaction information management method, device, equipment and storage medium
CN1588365A (en) Ciphertext global search technology
CN112511599A (en) Civil air defense data sharing system and method based on block chain
CN115422570A (en) Data processing method and system for distributed storage
CN112866227A (en) File authorization protection method and system
CN113794702A (en) Communication high-level encryption method in intelligent household system
CN105959099A (en) Method for encrypting SSR password
CA2312980A1 (en) System and method of sending and receiving secure data using anonymous keys
CN115378736B (en) Data processing system, method and storage medium of digital platform
CN116796355A (en) Data security protection and leakage prevention production method for data warehouse
CN115712919A (en) Regional medical data encryption and application method
CN213817804U (en) Secret key generating device
KR101214502B1 (en) Apparatus for data security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination