Dynamic Watermarking-Based Integrity Protection of Homomorphically Encrypted Databases - Application to Outsourced Genetic Data

In this paper, we propose a dynamic database crypto-watermarking scheme that enables a cloud service provider (CSP) to verify the integrity of encrypted databases outsourced by different users. This scheme takes advantage of the semantic security property most homomorphic cryptosystems have, so as to embed a watermark into encrypted data without altering users’ data. The incorrect detection of the watermark, not only informs the CSP the database has been illegally modified but also indicates which data have been altered. In addition, the proposed scheme is dynamic in the sense the watermarking and integrity verification processes can be conducted along the database lifecycle, i.e. even when the database owner updates his or her data (i.e. addition, suppression or modification of database elements). Experimental results carried out with the Paillier cryptosystem on a genetic database demonstrate that our method can efficiently detect different illegal data tamper with a high location precision.

[1]  C. Yeun,et al.  Cloud computing security management , 2010, 2010 Second International Conference on Engineering System Management and Applications.

[2]  Nora Cuppens-Boulahia,et al.  Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation , 2014, IEEE Transactions on Information Forensics and Security.

[3]  Gene Tsudik,et al.  Authentication and integrity in outsourced databases , 2006, TOS.

[4]  Ibrahim Kamel,et al.  Toward protecting the integrity of relational databases , 2011, 2011 World Congress on Internet Security (WorldCIS-2011).

[5]  Gouenou Coatrieux,et al.  Data hiding in homomorphically encrypted medical images for verifying their reliability in both encrypted and spatial domains , 2016, 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).

[6]  Salwa K. Abd-El-Hafiz,et al.  Symmetric encryption algorithms using chaotic and non-chaotic generators: A review , 2015, Journal of advanced research.

[7]  Gwénolé Quellec,et al.  Content-based image retrieval in homomorphic encryption domain , 2015, 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).

[8]  I-Ling Yen,et al.  Security analysis for order preserving encryption schemes , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).

[9]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 2001, IEEE Trans. Image Process..

[10]  Christian Roux,et al.  Lossless watermarking of categorical attributes for verifying medical data base integrity , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[11]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[12]  Rakesh Agrawal,et al.  Watermarking Relational Databases , 2002, Very Large Data Bases Conference.

[13]  Hsien-Chu Wu,et al.  Reversible Fragile Database Watermarking Technology using Difference Expansion Based on SVR Prediction , 2012, 2012 International Symposium on Computer, Consumer and Control.

[14]  Sushil Jajodia,et al.  A fragile watermarking scheme for detecting malicious modifications of database relations , 2006, Inf. Sci..

[15]  Christian Roux,et al.  A joint watermarking/encryption algorithm for verifying medical image integrity and authenticity in both encrypted and spatial domains , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[16]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[17]  Shijun Xiang,et al.  Database authentication watermarking scheme in encrypted domain , 2017, IET Inf. Secur..

[18]  V. Prasannaku A Robust Tamperproof Watermarking for Data Integrity in Relational Databases , 2009 .

[19]  Ming Zhou,et al.  ATBaM: An Arnold Transform Based Method on Watermarking Relational Data , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).