Lossless Database Watermarking Based on Order-preserving Encryption

被引:2
|
作者
Yan, Song [1 ]
Zheng, Shuli [1 ]
Ling, Baohong [2 ]
Hu, Donghui [1 ]
机构
[1] Hefei Univ Technol, Coll Comp Sci & Informat Engn, Hefei, Peoples R China
[2] Anhui Broadcasting Movie & Televis Coll, Coll Informat Engn, Hefei, Peoples R China
基金
中国国家自然科学基金;
关键词
Outsourced database; order-preserving encryption; lossless database watermarking; REVERSIBLE WATERMARKING; ROBUST;
D O I
10.1145/3472634.3474075
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of information technology and the popularity of Internet applications, the database outsourcing service is gaining popularity. However, since the database services provided by third parties are not completely trusted, the outsourced database model has to face a series of security issues such as privacy leakage, data theft, malicious tampering, and so forth. To both provide privacy protection and copyright tracking, this paper proposes a lossless database watermarking method based on order-preserving encryption. In the proposed method, the data owner encrypts the original data using order-preserving encryption algorithms. The outsourced database administrator then embeds the watermark bits by modifying the parities of the cover encrypted attribute values. At the database client, the database user extracts the embedded watermark bits based on the majority voting mechanism. The original database is recovered by directly decrypting the marked encrypted database. The experimental results and analysis show that the proposed method has the advantages of lossless, strong robustness, high embedding rate, no auxiliary message and low computational complexity.
引用
收藏
页码:216 / 223
页数:8
相关论文
共 50 条
  • [41] Economic Regionalization Based On Order-Preserving Submatrix
    1ST INTERNATIONAL CONFERENCE ON DATA SCIENCE, ICDS 2014, 2014, 30 : 39 - 49
  • [42] A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage
    Cash, David
    Zhang, Cong
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT II, 2018, 11240 : 159 - 176
  • [43] Efficient and Secure Top-k Queries With Top Order-Preserving Encryption
    Quan, Hanyu
    Wang, Boyang
    Zhang, Yuqing
    Wu, Gaofei
    IEEE ACCESS, 2018, 6 : 31525 - 31540
  • [44] Optimal Average-Complexity Ideal-Security Order-Preserving Encryption
    Kerschbaum, Florian
    Schroepfer, Axel
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 275 - 286
  • [45] MPOPE: Multi-provider Order-Preserving Encryption for Cloud Data Privacy
    Liang, Jinwen
    Qin, Zheng
    Xiao, Sheng
    Zhang, Jixin
    Yin, Hui
    Li, Keqin
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 808 - 822
  • [46] An Order-Preserving Encryption Scheme Based on Weighted Random Interval Division for Ciphertext Comparison in Wearable Systems
    Gui, Ruowei
    Yang, Liu
    Gui, Xiaolin
    SENSORS, 2022, 22 (20)
  • [47] A Group Order-Preserving Encryption Scheme based on Periodic Functions for Efficient Query Processing on Encrypted Data
    Lee, Hyunjo
    Choi, MunChol
    Chang, Jae-Woo
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 923 - 923
  • [48] RECOGNITION OF ORDER-PRESERVING MAPS
    ENGEL, K
    ORDER-A JOURNAL ON THE THEORY OF ORDERED SETS AND ITS APPLICATIONS, 1985, 2 (01): : 41 - 47
  • [49] Order-preserving reflectors and injectivity
    Carvalho, Margarida
    Sousa, Lurdes
    TOPOLOGY AND ITS APPLICATIONS, 2011, 158 (17) : 2408 - 2422
  • [50] Order-Preserving Transformations and Applications
    A. Cambini
    D.T. Luc
    L. Martein
    Journal of Optimization Theory and Applications, 2003, 118 : 275 - 293