Proceedings of the International Conference on Computer, Networks and Communication Engineering (ICCNCE 2013)

Analysis and Design on Security of SQLite

Authors
Haiyan Liu, Yaowan Gong
Corresponding Author
Haiyan Liu
Available Online July 2013.
DOI
10.2991/iccnce.2013.145How to use a DOI?
Keywords
Database, Security, Enryption, SQLite.
Abstract

This paper is to resolve the security problem of SQLite. The paper first analyzes some security methods commonly used in Database Area, as well as the current mechanism of SQLite. Then discusses the authentication, access control, encryption, audit, as well as the backup and restore mechanism of SQLite. At last, this paper combines authentication and encryption together, with the help of those interfaces prepared by SQLite, it implements an encrypting SQLite by adding codes of deriving keys, encryption and loging.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the International Conference on Computer, Networks and Communication Engineering (ICCNCE 2013)
Series
Advances in Intelligent Systems Research
Publication Date
July 2013
ISBN
10.2991/iccnce.2013.145
ISSN
1951-6851
DOI
10.2991/iccnce.2013.145How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Haiyan Liu
AU  - Yaowan Gong
PY  - 2013/07
DA  - 2013/07
TI  - Analysis and Design on Security of SQLite
BT  - Proceedings of the International Conference on Computer, Networks and Communication Engineering (ICCNCE 2013)
PB  - Atlantis Press
SP  - 585
EP  - 588
SN  - 1951-6851
UR  - https://doi.org/10.2991/iccnce.2013.145
DO  - 10.2991/iccnce.2013.145
ID  - Liu2013/07
ER  -