earticle

논문검색

Block-Based Scheme for Database Integrity Verification

초록

영어

Databases play an important role today in every modern organization, verifying their integrity is needed. Watermarking can be used to protect the integrity of database. In this paper, we present a secure fragile embedding watermark technique to verify the authenticity of an outsourced numeric relational database. Our technique treats the watermark embedding as an optimization problem by securely inserting a single watermark bit in individual database partition and the optimal threshold is computed for watermark detection. The approach partitions the database in different groups of square matrix and modifies the database while preserving the field values usability constraints. The database group determinant value is used to compute the position of field to be marked. Furthermore, we evaluated our scheme on a real case study and results show its effectiveness. The proposed scheme can detect and localize the malicious modifications made to the database. The proposed technique is highly resilient to common attacks and it overcomes some limitations of previous approaches on fragile watermarking.

목차

Abstract
 1. Introduction
 2. Related Works
 3. Approach Overview
  3.1 Preparation Phase of Data Usability Constraints (Preprocessing)
  3.2 Watermark Bits Generation Phase
  3.3 Data Partitioning Phase
  3.4 Attribute Selection Watermarking
  3.5 Watermark Embedding
  3.6 Data Partitioning
  3.7 Attribute Selection Watermarking
  3.8 Watermark Decoding
 4. Proposed Technique
  4.1 Data Usability Constraints Preparation Phase (Preprocessing)
  4.2 Watermark Bits Generation and Bit Index Selection for Encoding
  4.3 Data Partitioning
  4.4 Attribute Selection for Watermarking
  4.5 Watermark Embedding
  4.6 Watermark Decoding
 5. Effectiveness and Performance
  5.1. Insertion Attack
  5.2. Deletion Attack
  5.3 Alteration Attack
  5.4 Multifaceted Attack
 6. Discussion
  6.1. Security
  6.2. Embedding Distortion Amount Made to Database
  6.3. Blind Detection
  6.4. Integrity Checking and Alteration Localization
  6.5. Multi-bit Insertion
 7. Conclusion
 Acknowledgements
 References

저자정보

  • Lancine Camara College of Information Science and Engineering, Hunan University, Changsha 410082, Hunan, China, Key Laboratory for Embedded and Network Computing of Hunan Province, Changsha, Hunan 410082, China.
  • Junyi Li College of Information Science and Engineering, Hunan University, Changsha 410082, Hunan, China, Key Laboratory for Embedded and Network Computing of Hunan Province, Changsha, Hunan 410082, China.
  • Renfa Li College of Information Science and Engineering, Hunan University, Changsha 410082, Hunan, China, Key Laboratory for Embedded and Network Computing of Hunan Province, Changsha, Hunan 410082, China.
  • Faustin Kagorora College of Information Science and Engineering, Hunan University, Changsha 410082, Hunan, China, Key Laboratory for Embedded and Network Computing of Hunan Province, Changsha, Hunan 410082, China.
  • Damien Hanyurwimfura College of Information Science and Engineering, Hunan University, Changsha 410082, Hunan, China, Key Laboratory for Embedded and Network Computing of Hunan Province, Changsha, Hunan 410082, China.

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.