z-logo
open-access-imgOpen Access
Verifiable Access Technology of Hybrid Database in Distributed System Under Big Data
Author(s) -
Jinping Jia
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/2010/1/012071
Subject(s) - database , computer science , database testing , view , cloud database , database design , middleware (distributed applications) , cloud computing , database tuning , encryption , distributed database , database model , centralized database , data access , component (thermodynamics) , database schema , protocol (science) , operating system , physics , thermodynamics , medicine , alternative medicine , pathology
Targeting at the problem that the existing hybrid database solutions can not simultaneously realize the client’s verification and access function to the encrypted data in the public cloud database and the cross database query function in the heterogeneous database environment, this paper designs an access and integration middleware to realize the client’s verification and access function to the heterogeneous hybrid database in the public cloud and the cross database query function. Access and integration middleware is composed of verification access component and heterogeneous database data integration method. The verification and access component reconstructs the protocol interaction process based on MySQL protocol, and encrypts and decrypts the encrypted data in the public cloud database through the existing hybrid database scheme, so as to realize the client’s verification and access to the encrypted data in the cloud database. The heterogeneous database data integration method unifies the data from different types of databases, and then integrates them into the same database, and uses this database for query operation to realize cross database query. This paper first analyzes the hybrid database system model, then designs from the aspects of MySQL protocol analysis, verification access, data integration, and finally analyzes the access and integration middleware from the aspects of functionality and security.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here