Robust watermarking of databases in order-preserving encrypted domain
Shijun XIANG , Guanqi RUAN , Hao LI , Jiayong HE
Front. Comput. Sci. ›› 2022, Vol. 16 ›› Issue (2) : 162804
Robust watermarking of databases in order-preserving encrypted domain
Security of databases has always been a hot topic in the field of information security. Privacy protection can be realized by encrypting data, while data copyright can be protected by using digital watermarking technology. By combining these two technologies, a database’s copyright and privacy problems in the cloud can be effectively solved. Based on order-preserving encryption scheme (OPES), circular histogram and digital watermarking technology, this paper proposes a new robust watermarking scheme for protection of databases in the encrypted domain. Firstly, the OPES is used to encrypt data to avoid exposing the data in the cloud. Then, the encrypted data are grouped and modified by the use of a circular histogram for embedding a digital watermark. The common data query operations in database are available for the encrypted watermarking database. In receivers, the digital watermark and the original data can be restored through a secret key and a key table. Experimental results have shown that the proposed algorithm is robust against common database attacks in the encrypted domain.
database copyright / robust watermarking / orderpreserving encryption / circular histogram
| [1] |
Paryasto M, Alamsyah A, Rahardjo B. Big-data security management issues. 2014 2nd International Conference on Information and Communication Technology (ICoICT): IEEE, 2014. 59−63 |
| [2] |
|
| [3] |
|
| [4] |
|
| [5] |
Somani U, Lakhani K, Mundra M. Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing. 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010): IEEE, 2010. 211−216 |
| [6] |
|
| [7] |
Sangroya A, Kumar S, Dhok J, Varma V. Towards analyzing data security risks in cloud computing environments. International Conference on Information Systems, Technology and Management: Springer, 2010. 255−265 |
| [8] |
|
| [9] |
Chen D, Zhao H. Data security and privacy protection issues in cloud computing. 2012 International Conference on Computer Science and Electronics Engineering: IEEE, 2012. 647−651 |
| [10] |
Guimaraes M. New challenges in teaching database security. Proceedings of the 3rd annual conference on Information security curriculum development, 2006. 64−67 |
| [11] |
|
| [12] |
Salomaa A. Tutorial: Cryptography and data security. International Meeting of Young Computer Scientists: Springer, 1988. 220−244 |
| [13] |
|
| [14] |
Mollin, Richard, A. Cryptography: Theory and Practice. Third Edition. SIAM Review, 2007 |
| [15] |
Elovici Y, Waisenberg R, Shmueli E, Gudes E. A Structure Preserving Database Encryption Scheme. Secure Data Management, Vldb Workshop, Sdm, Toronto, Canada, August, 2004 |
| [16] |
Boneh D, Gentry C, Halevi S, Wang F, Wu D J. Private database queries using somewhat homomorphic encryption. International Conference on Applied Cryptography and Network Security: Springer, 2013. 102−118 |
| [17] |
|
| [18] |
Prabavathy B, Devi M S, Babu C. Multi-index technique for metadata management in private cloud storage. 2013 International Conference on Recent Trends in Information Technology (ICRTIT): IEEE, 2013. 84−89 |
| [19] |
Agrawal R, Kiernan J, Srikant R, Xu Y. Order preserving encryption for numeric data. Proceedings of the 2004 ACM SIGMOD international conference on Management of data, 2004. 563−574 |
| [20] |
Boldyreva A, Chenette N, Lee Y, O’neill A. Order-preserving symmetric encryption. Annual International Conference on the Theory and Applications of Cryptographic Techniques: Springer, 2009. 224−241 |
| [21] |
Boldyreva A, Chenette N, O’Neill A. Order-preserving encryption revisited: Improved security analysis and alternative solutions. Annual Cryptology Conference: Springer, 2011. 578−595 |
| [22] |
|
| [23] |
Popa R A, Li F H, Zeldovich N. An ideal-security protocol for order-preserving encoding. 2013 IEEE Symposium on Security and Privacy: IEEE, 2013. 463−477 |
| [24] |
|
| [25] |
Agrawal R, Kiernan J. Watermarking relational databases. VLDB'02: Proceedings of the 28th International Conference on Very Large Databases: Elsevier, 2002. 155−166 |
| [26] |
|
| [27] |
|
| [28] |
|
| [29] |
|
| [30] |
|
Higher Education Press
/
| 〈 |
|
〉 |