Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

邮发代号 80-970

2019 Impact Factor: 1.275

Frontiers of Computer Science  2022, Vol. 16 Issue (2): 162804   https://doi.org/10.1007/s11704-020-0112-z
  本期目录
Robust watermarking of databases in order-preserving encrypted domain
Shijun XIANG(), Guanqi RUAN, Hao LI, Jiayong HE
College of Information Science and Technology, Jinan University, Guangzhou 510632, China
 全文: PDF(16432 KB)   HTML
Abstract

Security of databases has always been a hot topic in the field of information security. Privacy protection can be realized by encrypting data, while data copyright can be protected by using digital watermarking technology. By combining these two technologies, a database’s copyright and privacy problems in the cloud can be effectively solved. Based on order-preserving encryption scheme (OPES), circular histogram and digital watermarking technology, this paper proposes a new robust watermarking scheme for protection of databases in the encrypted domain. Firstly, the OPES is used to encrypt data to avoid exposing the data in the cloud. Then, the encrypted data are grouped and modified by the use of a circular histogram for embedding a digital watermark. The common data query operations in database are available for the encrypted watermarking database. In receivers, the digital watermark and the original data can be restored through a secret key and a key table. Experimental results have shown that the proposed algorithm is robust against common database attacks in the encrypted domain.

Key wordsdatabase copyright    robust watermarking    orderpreserving encryption    circular histogram
收稿日期: 2020-05-19      出版日期: 2021-09-18
Corresponding Author(s): Shijun XIANG   
 引用本文:   
. [J]. Frontiers of Computer Science, 2022, 16(2): 162804.
Shijun XIANG, Guanqi RUAN, Hao LI, Jiayong HE. Robust watermarking of databases in order-preserving encrypted domain. Front. Comput. Sci., 2022, 16(2): 162804.
 链接本文:  
https://academic.hep.com.cn/fcs/CN/10.1007/s11704-020-0112-z
https://academic.hep.com.cn/fcs/CN/Y2022/V16/I2/162804
Fig.1  
x (a value close to the median of D) y (the median of R)
44 500
23 250
34 375
27 313
24 282
25 298
26 306
Tab.1  
Fig.2  
Fig.3  
Ciphertext value Interval
286 {15,3 }
300 {7,1 }
Tab.2  
Fig.4  
Fig.5  
Fig.6  
Fig.7  
Algorithm Capacity Robustness Order- preserving or not Watermark embedded in plaintexts or ciphertexts
Algorithm in [ 20] / / Yes /
Algorithm in [ 24] almost 0.1 bpp weak Yes ciphertexts
Algorithm in [ 30] higher than 0.1 bpp strong No plaintexts
Proposed algorithm almost 0.1 bpp strong Yes ciphertexts
Tab.3  
Fig.8  
1 Paryasto M, Alamsyah A, Rahardjo B. Big-data security management issues. 2014 2nd International Conference on Information and Communication Technology (ICoICT): IEEE, 2014. 59−63
2 L M Kaufman . Data security in the world of cloud computing. IEEE Security & Privacy, 2009, 7( 4): 61– 64
3 M Martinez-Diaz , J Fierrez , J Galbally . The DooDB graphical password database: Data analysis and benchmark results. IEEE Access, 2013, 1 : 596– 605
https://doi.org/10.1109/ACCESS.2013.2281773
4 M H Kamarudin , C Maple , T Watson , N S Safa . A logitboost-based algorithm for detecting known and unknown web attacks. IEEE Access, 2017, 5 : 26190– 26200
https://doi.org/10.1109/ACCESS.2017.2766844
5 Somani U, Lakhani K, Mundra M. Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing. 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010): IEEE, 2010. 211−216
6 B Feng , X Ma , C Guo , H Shi , Z Fu , T Qiu . An efficient protocol with bidirectional verification for storage security in cloud computing. IEEE Access, 2016, 4 : 7899– 7911
https://doi.org/10.1109/ACCESS.2016.2621005
7 Sangroya A, Kumar S, Dhok J, Varma V. Towards analyzing data security risks in cloud computing environments. International Conference on Information Systems, Technology and Management: Springer, 2010. 255−265
8 M Li , W Lou , K Ren . Data security and privacy in wireless body area networks. IEEE Wireless communications, 2010, 17( 1): 51– 58
https://doi.org/10.1109/MWC.2010.5416350
9 Chen D, Zhao H. Data security and privacy protection issues in cloud computing. 2012 International Conference on Computer Science and Electronics Engineering: IEEE, 2012. 647−651
10 Guimaraes M. New challenges in teaching database security. Proceedings of the 3rd annual conference on Information security curriculum development, 2006. 64−67
11 A Sledge . Wilton marketing agency sends eBay out on road. Fairfield County Business Journal, 1999,
12 Salomaa A. Tutorial: Cryptography and data security. International Meeting of Young Computer Scientists: Springer, 1988. 220−244
13 D Liu , A S Wang . Nonlinear order preserving index for encrypted database query in service cloud environments. Concurrency & Computation Practice & Experience, 2013, 25( 13): 1967– 1984
14 Mollin, Richard, A. Cryptography: Theory and Practice. Third Edition. SIAM Review, 2007
15 Elovici Y, Waisenberg R, Shmueli E, Gudes E. A Structure Preserving Database Encryption Scheme. Secure Data Management, Vldb Workshop, Sdm, Toronto, Canada, August, 2004
16 Boneh D, Gentry C, Halevi S, Wang F, Wu D J. Private database queries using somewhat homomorphic encryption. International Conference on Applied Cryptography and Network Security: Springer, 2013. 102−118
17 E Shmueli , R Vaisenberg , Y Elovici , C Glezer . Database encryption: an overview of contemporary challenges and design considerations. ACM SIGMOD Record, 2010, 38( 3): 29– 34
https://doi.org/10.1145/1815933.1815940
18 Prabavathy B, Devi M S, Babu C. Multi-index technique for metadata management in private cloud storage. 2013 International Conference on Recent Trends in Information Technology (ICRTIT): IEEE, 2013. 84−89
19 Agrawal R, Kiernan J, Srikant R, Xu Y. Order preserving encryption for numeric data. Proceedings of the 2004 ACM SIGMOD international conference on Management of data, 2004. 563−574
20 Boldyreva A, Chenette N, Lee Y, O’neill A. Order-preserving symmetric encryption. Annual International Conference on the Theory and Applications of Cryptographic Techniques: Springer, 2009. 224−241
21 Boldyreva A, Chenette N, O’Neill A. Order-preserving encryption revisited: Improved security analysis and alternative solutions. Annual Cryptology Conference: Springer, 2011. 578−595
22 K Li , W Zhang , C Yang , N Yu . Security analysis on one-to-many order preserving encryption-based cloud data search. IEEE Transactions on Information Forensics and Security, 2015, 10( 9): 1918– 1926
https://doi.org/10.1109/TIFS.2015.2435697
23 Popa R A, Li F H, Zeldovich N. An ideal-security protocol for order-preserving encoding. 2013 IEEE Symposium on Security and Privacy: IEEE, 2013. 463−477
24 S J Xiang , J Y He . Database authentication watermarking scheme in encrypted domain. IET Information Security, 2017, 12( 1): 42– 51
25 Agrawal R, Kiernan J. Watermarking relational databases. VLDB'02: Proceedings of the 28th International Conference on Very Large Databases: Elsevier, 2002. 155−166
26 R Sion , M Atallah , S Prabhakar . Rights protection for relational data. IEEE transactions on knowledge and data engineering, 2004, 16( 12): 1509– 1525
https://doi.org/10.1109/TKDE.2004.94
27 G Gupta , J Pieprzyk . Reversible and blind database watermarking using difference expansion. International Journal of Digital Crime and Forensics (IJDCF), 2009, 1( 2): 42– 54
https://doi.org/10.4018/jdcf.2009040104
28 M Shehab , E Bertino , A Ghafoor . Watermarking relational databases using optimization-based techniques. IEEE transactions on Knowledge and Data Engineering, 2007, 20( 1): 116– 129
29 F Zhou , H-X Zhao . Relational database watermarking algorithm based on chaos and DCT. Jisuanji Yingyong Yanjiu, 2012, 29( 2): 786– 788
30 J Franco-Contreras , G Coatrieux . Robust watermarking of relational databases with ontology-guided distortion control. IEEE transactions on information forensics and security, 2015, 10( 9): 1939– 1952
https://doi.org/10.1109/TIFS.2015.2439962
[1] Highlights Download
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed