Analysis and Design on Security of SQLite
Authors
Haiyan Liu, Yaowan Gong
Corresponding Author
Haiyan Liu
Available Online July 2013.
- DOI
- 10.2991/iccnce.2013.145How to use a DOI?
- Keywords
- Database, Security, Enryption, SQLite.
- Abstract
This paper is to resolve the security problem of SQLite. The paper first analyzes some security methods commonly used in Database Area, as well as the current mechanism of SQLite. Then discusses the authentication, access control, encryption, audit, as well as the backup and restore mechanism of SQLite. At last, this paper combines authentication and encryption together, with the help of those interfaces prepared by SQLite, it implements an encrypting SQLite by adding codes of deriving keys, encryption and loging.
- Copyright
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Haiyan Liu AU - Yaowan Gong PY - 2013/07 DA - 2013/07 TI - Analysis and Design on Security of SQLite BT - Proceedings of the International Conference on Computer, Networks and Communication Engineering (ICCNCE 2013) PB - Atlantis Press SP - 585 EP - 588 SN - 1951-6851 UR - https://doi.org/10.2991/iccnce.2013.145 DO - 10.2991/iccnce.2013.145 ID - Liu2013/07 ER -