首页 | 本学科首页   官方微博 | 高级检索  
     

一种保序加密域数据库认证水印算法
引用本文:项世军,何嘉勇.一种保序加密域数据库认证水印算法[J].软件学报,2018,29(12):3837-3852.
作者姓名:项世军  何嘉勇
作者单位:暨南大学 信息科学技术学院/网络空间安全学院, 广东 广州 510632;信息安全国家重点实验室(中国科学院 信息工程研究所), 北京 100093,暨南大学 信息科学技术学院/网络空间安全学院, 广东 广州 510632;信息安全国家重点实验室(中国科学院 信息工程研究所), 北京 100093
基金项目:国家自然科学基金(61272414,61772234);信息安全国家重点实验室开放课题(2016-MS-07)
摘    要:加密域水印技术适用于云环境下的隐私保护(加密)和数据安全认证(加水印).通过结合保序加密、离散余弦变换、密码哈希和数字水印技术,提出了加密域数据库认证水印算法.首先对数据进行保序加密,以达到对敏感数据内容的隐私保护;对加密后的数据进行分组和离散余弦变换处理,然后将交流系数的哈希(Hashing)值作为认证信息嵌入到直流系数中来认证数据的完整性;可通过比对交流系数的哈希值和从直流系数中提取的水印信息,来判断加密数据是否受到篡改.水印嵌入设计很好地结合了保序加密的特性,使得对加密数据的水印嵌入不会影响到明文数据的正确恢复,利用密钥对加水印的加密数据库直接解密可得到原数据库.实验结果表明:所提出的算法不仅能够用于保护数据库中的内容隐私,而且能检测出不同程度的篡改和有效认证数据库数据的完整性.

关 键 词:保序加密方案  数据库  水印  完整性认证  离散余弦变换
收稿时间:2016/11/30 0:00:00
修稿时间:2017/3/22 0:00:00

Database Authentication Watermarking Algorithm in Order Preserving Encrypted Domain
XIANG Shi-Jun and HE Jia-Yong.Database Authentication Watermarking Algorithm in Order Preserving Encrypted Domain[J].Journal of Software,2018,29(12):3837-3852.
Authors:XIANG Shi-Jun and HE Jia-Yong
Affiliation:College of Information Science and Technology/College of Cyber Security, Jinan University, Guangzhou 510632, China;State Key Laboratory of Information Security(Institute of Information Engineering, The Chinese Academy of Sciences), Beijing 100093, China and College of Information Science and Technology/College of Cyber Security, Jinan University, Guangzhou 510632, China;State Key Laboratory of Information Security(Institute of Information Engineering, The Chinese Academy of Sciences), Beijing 100093, China
Abstract:Digital watermarking in encrypted domain is a potential technology for privacy protection (with encryption) and integrity authentication (with watermarking) in cloud computing environments. Based on order-preserving encryption scheme (OPES), discrete cosine transformation (DCT), cryptography hash and watermarking technologies, this paper proposes a new database authentication watermarking algorithm in encrypted domain. Firstly, data in a database are encrypted with OPES for privacy protection. Then, the encrypted data are divided into groups for DCT operations. The watermark bits generated by hashing AC coefficients are embedded into DC coefficients for authenticating the encrypted data. The receiver can determine whether the data have been tampered by matching the hash value of AC coefficients and the extracted watermark bits from DC coefficients. The watermark embedding process in encrypted domain is lossless to plaintext data by exploring order-preserving property of OPES. In the receiver, an illegal user can recover the original database by directly decrypting the watermarked ciphertext data. Experimental results have shown that the algorithm can efficiently detect different tampering operations while protecting data content privacy with the encryption.
Keywords:order preserving encryption scheme  database  watermarking  integrity authentication  discrete cosine transformation
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号