In the Shadows We Trust: A Secure Aggregation Tolerant Watermark for Data Streams

被引:0
|
作者
Panah, Arezou Soltani [1 ]
van Schyndel, Ron [1 ]
Sellis, Timos [1 ]
Bertino, Elisa [2 ]
机构
[1] RMIT Univ, Dept Comp Sci & IT, Melbourne, Vic 3000, Australia
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47906 USA
关键词
digital watermarking; data integrity; data provenance; data aggregation; spread spectrum; pseudo-random codes; CDMA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In many applications such as sensor networks, e-healthcare and environmental monitoring, data is continuously streamed and combined from multiple resources in order to make decisions based on the aggregated data streams. One major concern in these applications is assuring high trustworthiness of the aggregated data stream for correct decision-making. For example, an adversary may compromise a few data-sources and introduce false data into the aggregated data-stream and cause catastrophic consequences. In this work, we propose a novel method for verifying data integrity by embedding several signature codes within data streams known as digital watermarking. Therefore, the integrity of the data streams can be verified by decoding the embedded signatures even as the data go through multiple stages of aggregation process. Although the idea of secure data aggregation based on digital watermarking has been explored before, we aim to improve the efficiency of the scheme by examining several signature codes that could also decrease the watermark detection complexity. This is achieved by simultaneous embedding of several shifted watermark patterns into aggregated data stream, such that the contribution of each data-source is hidden in the relative shifts of the patterns. We, also, derive conditions to preserve the main statistical properties of data-streams prior to the embedding procedure. Therefore, we can guarantee that the embedding procedure does not compromise the usability of data streams for any operations that depends on these statistical characteristics. The simulation results show that the embedded watermarks can successfully be recovered with high confidence if proper hiding codes are chosen.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] Accelerating Aggregation Queries on Unstructured Streams of Data
    Russo, Matthew
    Hashimoto, Tatsunori
    Kang, Daniel
    Sun, Yi
    Zaharia, Matei
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (11): : 2897 - 2910
  • [32] Reliable aggregation over prioritized data streams
    Works, Karen, 1600, Springer Verlag (8800):
  • [33] Efficient Aggregation Methods for Probabilistic Data Streams
    Goman, Maksim
    BUSINESS MODELING AND SOFTWARE DESIGN, BMSD 2018, 2018, 319 : 116 - 132
  • [34] Adaptively detecting aggregation bursts in data streams
    Zhou, AY
    Qin, SK
    Qian, WN
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PROCEEDINGS, 2005, 3453 : 435 - 446
  • [35] Fault-Tolerant Secure Data Aggregation Schemes in Smart Grids: Techniques, Design Challenges, and Future Trends
    Khan, Hayat Mohammad
    Khan, Abid
    Khan, Basheir
    Jeon, Gwanggil
    ENERGIES, 2022, 15 (24)
  • [36] Data We Trust-But What Data?
    Golbeck, Jennifer
    REFERENCE & USER SERVICES QUARTERLY, 2018, 57 (03) : 196 - 199
  • [37] Can we trust the data? - the data detective
    Carlisle, J.
    SOUTH AFRICAN JOURNAL OF SURGERY, 2024, 62 (03) : 239 - 241
  • [38] Discussion: Process data streams aggregation versus product samples aggregation
    Reis, Marco S.
    JOURNAL OF QUALITY TECHNOLOGY, 2021, 53 (01) : 33 - 37
  • [39] RETRACTED: Fault-Tolerant Secure Routing Based on Trust Evaluation Model in Data Center Networks (Retracted Article)
    Liu, Ningning
    Fan, Weibei
    Fan, Jianxi
    Zheng, Hui
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [40] Practical Fault-Tolerant Data Aggregation
    Grining, Krzysztof
    Klonowski, Marek
    Syga, Piotr
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 386 - 404