Abstract
In the era of big data, data sharing not only boosts the economy of the world but also brings about problems of privacy disclosure and copyright infringement. The collected data may contain users’ sensitive information; thus, privacy protection should be applied to the data prior to them being shared. Moreover, the shared data may be re-shared to third parties without the consent or awareness of the original data providers. Therefore, there is an urgent need for copyright tracking. There are few works satisfying the requirements of both privacy protection and copyright tracking. The main challenge is how to protect the shared data and realize copyright tracking while not undermining the utility of the data. In this article, we propose a novel solution of a reversible database watermarking scheme based on order-preserving encryption. First, we encrypt the data using order-preserving encryption and adjust an encryption parameter within an appropriate interval to generate a ciphertext with redundant space. Then, we leverage the redundant space to embed robust reversible watermarking. We adopt grouping and K-means to improve the embedding capacity and the robustness of the watermark. Formal theoretical analysis proves that the proposed scheme guarantees correctness and security. Results of extensive experiments show that OPEW has 100% data utility, and the robustness and efficiency of OPEW are better than existing works.
- [1] . 2002. Watermarking relational databases. In Proceedings of the 28th International Conference on Very Large Databases. Elsevier, 155–166.Google ScholarDigital Library
- [2] . 2004. Order preserving encryption for numeric data. In Proceedings of the ACM SIGMOD International Conference on Management of Data. ACM, 563–574.Google ScholarDigital Library
- [3] . 2005. Privacy and ownership preserving of outsourced medical data. In Proceedings of the 21st International Conference on Data Engineering (ICDE’05). IEEE, 521–532.Google ScholarDigital Library
- [4] . 2021. Side-channel attacks on query-based data anonymization. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 1254–1265.Google ScholarDigital Library
- [5] . 2009. Order-preserving symmetric encryption. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 224–241.Google ScholarCross Ref
- [6] . 2011. Order-preserving encryption revisited: Improved security analysis and alternative solutions. In Proceedings of the Annual Cryptology Conference. Springer, 578–595.Google ScholarCross Ref
- [7] . 2015. Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 563–594.Google ScholarCross Ref
- [8] . 2016. Practical order-revealing encryption with limited leakage. In Fast Software Encryption, (Ed.). Springer, Berlin, 474–493.Google ScholarDigital Library
- [9] . 2020. Real-time detection for cache side channel attack using performance counter monitor. Appl. Sci. 10, 3 (2020).Google ScholarCross Ref
- [10] . 2019. SDTE: A secure blockchain-based data trading ecosystem. IEEE Trans. Inf. Forens. Secur. 15 (2019), 725–737.Google ScholarDigital Library
- [11] . 2020. EVA: An encrypted vector arithmetic language and compiler for efficient homomorphic computation. In Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation. Association for Computing Machinery, 546–561.Google ScholarDigital Library
- [12] . 2019. CHET: An optimizing compiler for fully-homomorphic neural-network inferencing. In Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. Association for Computing Machinery, 142–156.Google ScholarDigital Library
- [13] . 2017. Order-preserving encryption using approximate integer common divisors. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, 257–274.Google Scholar
- [14] . 2018. A survey on big data market: Pricing, trading and protection. IEEE Access 6, 99 (2018), 15132–15154.Google Scholar
- [15] . 2010. A novel blind reversible method for watermarking relational databases. In Proceedings of the International Symposium on Parallel and Distributed Processing with Applications. IEEE, 563–569.Google ScholarDigital Library
- [16] . 2013. A novel blind reversible method for watermarking relational databases. J. Chinese Instit. Eng. 36, 1 (2013), 87–97.Google ScholarCross Ref
- [17] . 2017. Robust lossless watermarking of relational databases based on circular histogram modulation. IEEE Trans. Inf. Forens. Secur. 9, 3 (2017), 397–410.Google ScholarDigital Library
- [18] . 2013. Request-based comparable encryption. In Proceedings of the European Symposium on Research in Computer Security. Springer, 129–146.Google ScholarCross Ref
- [19] . 2009. A Fully Homomorphic Encryption Scheme, Vol. 20. Stanford University, Stanford, CA.Google ScholarDigital Library
- [20] . 2011. Query-preserving watermarking of relational databases and XML documents. ACM Trans. Datab. Syst. 36, 1 (2011), 1–24.Google ScholarDigital Library
- [21] . 2006. Fingerprinting relational databases. In Proceedings of the ACM Symposium on Applied Computing. 487–492.Google ScholarDigital Library
- [22] . 2008. Reversible and blind database watermarking using difference expansion. In Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop, Vol. 24, 1–6.Google ScholarCross Ref
- [23] . 2021. Invited: Accelerating fully homomorphic encryption with processing in memory. In Proceedings of the 58th ACM/IEEE Design Automation Conference (DAC). 1335–1338.
DOI: Google ScholarDigital Library - [24] . 2001. Approximate integer common divisors. In Proceedings of the International Cryptography and Lattices Conference. Springer, 51–66.Google ScholarCross Ref
- [25] . 2018. A new robust approach for reversible database watermarking with distortion control. IEEE Trans. Knowl. Data Eng. 31, 6 (2018), 1024–1037.Google ScholarCross Ref
- [26] . 2020. An enhanced wildcard-based fuzzy searching scheme in encrypted databases. World Wide Web 23, 3 (2020), 2185–2214.Google ScholarDigital Library
- [27] . 2022. MATCHA: A fast and energy-efficient accelerator for fully homomorphic encryption over the torus. In Proceedings of the 59th ACM/IEEE Design Automation Conference. Association for Computing Machinery, 235–240.Google ScholarDigital Library
- [28] . 2002. An efficient k-means clustering algorithm: Analysis and implementation. IEEE Trans. Pattern Anal. Mach. Intell.7 (2002), 881–892.Google ScholarDigital Library
- [29] . 2020. Privacy-preserving navigation supporting similar queries in vehicular networks. IEEE Trans. Depend. Secure Comput. 99 (2020), 1–1.Google Scholar
- [30] . 2022. Astraea: Anonymous and secure auditing based on private smart contracts for donation systems. IEEE Trans. Depend. Secure Comput. (2022), 1–17.Google Scholar
- [31] . 2022. Towards secure and efficient equality conjunction search over outsourced databases. IEEE Trans. Cloud Comput. 10, 2 (2022), 1445–1461.Google ScholarCross Ref
- [32] . 2022. EncodeORE: Reducing leakage and preserving practicality in order-revealing encryption. IEEE Trans. Depend. Secure Comput. 19, 3 (2022), 1579–1591.
DOI: Google ScholarCross Ref - [33] . 2015. Inference attacks on property-preserving encrypted databases. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15). Association for Computing Machinery, New York, NY, 644–655.Google ScholarDigital Library
- [34] . 2011. CryptDB: Protecting confidentiality with encrypted query processing. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles. Association for Computing Machinery, 85–100.Google ScholarDigital Library
- [35] . 2021. F1: A fast and programmable accelerator for fully homomorphic encryption. In Proceedings of the 54th Annual IEEE/ACM International Symposium on Microarchitecture. Association for Computing Machinery, 238–252.Google ScholarDigital Library
- [36] . 2022. Equi-joins over encrypted data for series of queries. In Proceedings of the IEEE 38th International Conference on Data Engineering (ICDE). 1635–1648.Google ScholarCross Ref
- [37] . 2021. Database reconstruction from noisy volumes: A cache side-channel attack on SQLite. In Proceedings of the 30th USENIX Security Symposium (USENIX Security’21). USENIX Association, 1019–1035.Google Scholar
- [38] . 2006. Reversible data hiding. IEEE Trans. Circ. Syst. Vid. Technol. 16, 3 (2006), 354–362.Google ScholarDigital Library
- [39] . 2004. Lossless data hiding: Fundamentals, algorithms and applications. In Proceedings of the IEEE International Symposium on Circuits and Systems. IEEE, II–33.Google ScholarCross Ref
- [40] . 2019. FPGA-based high-performance parallel architecture for homomorphic computing on encrypted data. In Proceedings of the IEEE International Symposium on High Performance Computer Architecture (HPCA’19). 387–398.
DOI: Google ScholarCross Ref - [41] . 2004. Rights protection for relational data. IEEE Trans. Knowl. Data Eng. 16, 12 (2004), 1509–1525.Google ScholarDigital Library
- [42] . 2014. Order-preserving encryption secure beyond one-wayness. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security. Springer, 42–61.Google ScholarCross Ref
- [43] . 2007. Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16, 3 (2007), 721–730.Google ScholarDigital Library
- [44] . 2003. Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Vid. Technol. 13, 8 (2003), 890–896.Google ScholarDigital Library
- [45] . 2005. A VLSI design flow for secure side-channel attack resistant ICs. In Proceedings of the Design, Automation and Test in Europe Conference. 58–63.Google ScholarDigital Library
- [46] . 2017. Database authentication watermarking scheme in encrypted domain. IET Inf. Secur. 12, 1 (2017), 42–51.Google ScholarDigital Library
- [47] . 2011. Reversible data hiding in encrypted image. IEEE Sig. Process. Lett. 18, 4 (2011), 255–258.Google ScholarCross Ref
- [48] . 2011. Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forens. Secur. 7, 2 (2011), 826–832.Google ScholarDigital Library
- [49] . 2006. Reversible watermarking for relational database authentication. J. Comput. 17, 2 (2006), 59–66.Google Scholar
Index Terms
- Reversible Database Watermarking Based on Order-preserving Encryption for Data Sharing
Recommendations
A Graded Reversible Watermarking Scheme for Relational Data
AbstractReversible watermarking is an important method of information hiding, which has been widely used in copyright protection of relational data. Reversible watermarking is more advanced than its predecessors in many ways. It can be used not only to ...
Robust image watermarking scheme using bit-plane of hadamard coefficients
Nowadays, due to widespread usage of the Internet, digital contents are distributed quickly and inexpensively throughout the world. Watermarking techniques can help protect authenticity of digital contents by identifying their owners. In a watermarking ...
Reversible and blind database watermarking using difference expansion
e-Forensics '08: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshopDatabase watermarking has received significant research attention in the current decade. Although, almost all watermarking models have been either irreversible (the original relation cannot be restored from the watermarked relation) and/or non-blind (...
Comments