2014
DOI: 10.14257/ijsia.2014.8.6.03
|View full text |Cite
|
Sign up to set email alerts
|

Block-Based Scheme for Database Integrity Verification

Abstract: Databases play an important role today in every modern organization, verifying their integrity is needed. Watermarking can be used to protect the integrity of database. In this paper, we present a secure fragile embedding watermark technique to verify the authenticity of an outsourced numeric relational database. Our technique treats the watermark embedding as an optimization problem by securely inserting a single watermark bit in individual database partition and the optimal threshold is computed for watermar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…The dataset D is to be divided into m non-overlapping groups, namely, such that each partition Si holds on the average |D|/m tuples from the dataset D; see [10][24] [26][27][28][29][30][31][32][33][34][35] for more details. In this case, an attacker cannot guess the tuples-to-partition transfer without the awareness of the secret key Ks and the number of partitions m, which are reserved secret.…”
Section: Methodsmentioning
confidence: 99%
“…The dataset D is to be divided into m non-overlapping groups, namely, such that each partition Si holds on the average |D|/m tuples from the dataset D; see [10][24] [26][27][28][29][30][31][32][33][34][35] for more details. In this case, an attacker cannot guess the tuples-to-partition transfer without the awareness of the secret key Ks and the number of partitions m, which are reserved secret.…”
Section: Methodsmentioning
confidence: 99%
“…In addition, the DF is zero if any single row or column has zero values only. In order to alleviate this problem, a new technique is performed as given below: For each element of the matrix is reconstructed using matrix dialing method to formalize the original data matrix into a new matrix [20]. The determinants of both original and Dialing rotational matrices computed and appended with each matrix.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…Algorithm 1 shows the parsing process used in the paper. The proposed partitioning algorithm is the partitioning technique used in [15] .It partitions the database R composed of α tuples and γ attributes to v different groups. The partitioning is based on a primary key attribute P of each tuple and a secret key K , a secure hash function is computed for each tuple and γ tuples are inserted logically into individual partition described as the following:…”
Section: Database Partitioningmentioning
confidence: 99%
“…Since our technique is fragile and malicious modifications in database is not allowed but if a modification occurs in the database, the partition determinant value will inevitably change. In our previous work [11,15], we analyzed the success of the use of probability to change the database while keeping the watermark intact is hard to process may be impossible. By using theory of probability, the probability of successfully modifying the database by preserving its group's determinant values becomes: where  represents the number of database attribute and  the number of database tuples, having a large database the probability of success is very small and approaches zero.…”
Section: Security and Analysismentioning
confidence: 99%