In the Shadows We Trust: A Secure Aggregation Tolerant Watermark for Data Streams

被引:0
|
作者
Panah, Arezou Soltani [1 ]
van Schyndel, Ron [1 ]
Sellis, Timos [1 ]
Bertino, Elisa [2 ]
机构
[1] RMIT Univ, Dept Comp Sci & IT, Melbourne, Vic 3000, Australia
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47906 USA
关键词
digital watermarking; data integrity; data provenance; data aggregation; spread spectrum; pseudo-random codes; CDMA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In many applications such as sensor networks, e-healthcare and environmental monitoring, data is continuously streamed and combined from multiple resources in order to make decisions based on the aggregated data streams. One major concern in these applications is assuring high trustworthiness of the aggregated data stream for correct decision-making. For example, an adversary may compromise a few data-sources and introduce false data into the aggregated data-stream and cause catastrophic consequences. In this work, we propose a novel method for verifying data integrity by embedding several signature codes within data streams known as digital watermarking. Therefore, the integrity of the data streams can be verified by decoding the embedded signatures even as the data go through multiple stages of aggregation process. Although the idea of secure data aggregation based on digital watermarking has been explored before, we aim to improve the efficiency of the scheme by examining several signature codes that could also decrease the watermark detection complexity. This is achieved by simultaneous embedding of several shifted watermark patterns into aggregated data stream, such that the contribution of each data-source is hidden in the relative shifts of the patterns. We, also, derive conditions to preserve the main statistical properties of data-streams prior to the embedding procedure. Therefore, we can guarantee that the embedding procedure does not compromise the usability of data streams for any operations that depends on these statistical characteristics. The simulation results show that the embedded watermarks can successfully be recovered with high confidence if proper hiding codes are chosen.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Secure Data Aggregation in Wireless Sensor Networks
    Roy, Sankardas
    Conti, Mauro
    Setia, Sanjeev
    Jajodia, Sushil
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 1040 - 1052
  • [42] Secure Data Aggregation in Wireless Sensor Networks
    Vaidehi, V.
    Kayalvizhi, R.
    Sekar, N. Chandra
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 2179 - 2184
  • [43] Secure Data Aggregation in Wireless Sensor Networks
    Ben Othman, Soufiene
    Trad, Abdelbasset
    Youssef, Habib
    Alzaid, Hani
    2013 12TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET 2013), 2013, : 55 - 58
  • [44] Privacy Preserving Data Aggregation on Secure Cloud
    Komawar, Saket
    Batwal, Mayur
    Shah, Shubham
    Shahani, Snehkumar
    Abraham, Jibi
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [45] Can We Trust Your Data?
    Moore, Susan
    ONCOLOGY NURSING FORUM, 2011, 38 (06) : 615 - 615
  • [46] Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing
    Chen, Ing-Ray
    Bao, Fenye
    Chang, MoonJeong
    Cho, Jin-Hee
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (05) : 1200 - 1210
  • [47] SFPDA: Secure Fault-Tolerant and Privacy-Enhanced Data Aggregation Scheme for Smart Grid Without TA
    Zhou, Tanping
    Chen, Shuo
    Xie, Huiyu
    Wu, Liqiang
    Yang, Xiaoyuan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (21): : 35669 - 35680
  • [48] Data randomization for lightweight secure data aggregation in sensor network
    Mohaisen, Abedelaziz
    Jeong, Ik Rae
    Hong, Dowon
    Jho, Nam-Su
    Nyang, DaeHun
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2008, 5061 : 338 - +
  • [49] Load shedding for aggregation queries over data streams
    Babcock, B
    Datar, M
    Motwani, R
    20TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2004, : 350 - 361
  • [50] Rank Aggregation for Non-stationary Data Streams
    Irurozki, Ekhine
    Perez, Aritz
    Lobo, Jesus
    Del Ser, Javier
    MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2021: RESEARCH TRACK, PT III, 2021, 12977 : 297 - 313