| With the prevalence and increase of the application of computer networks, databases are widely used in various domains. The security of database has become one of the important aspects of the computer security. The traditional research of the database security concentrates on the multi-layer safe database, access controlling, database encoding, and channel control and so on. The aim that the database studies is to defend intrusion or attacks. Preventive measures sometimes fail to deflect malicious attacks. A growing recognition is that a variety of mission critical applications need to continue to operate or provide a minimal level of services even when they are under attack or have been partially compromised; hence the need for intrusion tolerance.This paper proceeds from the importance and demand of the database security, carries on the detailed and deep discussion in intrusion tolerance databasee. On this foundation, the paper proposes an intrusion tolerant database security model based on trapping mechanism. It adopts the trigger of intrusion detect system and intrusion deception mechanism to fool and hold off attacker, enhance the security of database system. The paper also discusses in detail the principle and the pivotal technologies of the model. By the use of IDA code, this paper proposes a practical scheme of secure storage based on IDA code which can implement the confidentiality of the database, compared with secret sharing shceme of Shamir, it sharply reduce the expense of the calculate. So it can be realized simply, and has higher efficiency. At the same time, in order to improve the survive of database, the system also uses reconfiguration strategies to better adaptability and resilience. |