Advertisement

Dynamic Watermarking-Based Integrity Protection of Homomorphically Encrypted Databases – Application to Outsourced Genetic Data

  • David NiyitegekaEmail author
  • Gouenou Coatrieux
  • Reda Bellafqira
  • Emmanuelle Genin
  • Javier Franco-Contreras
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11378)

Abstract

In this paper, we propose a dynamic database crypto-watermarking scheme that enables a cloud service provider (CSP) to verify the integrity of encrypted databases outsourced by different users. This scheme takes advantage of the semantic security property most homomorphic cryptosystems have, so as to embed a watermark into encrypted data without altering users’ data. The incorrect detection of the watermark, not only informs the CSP the database has been illegally modified but also indicates which data have been altered. In addition, the proposed scheme is dynamic in the sense the watermarking and integrity verification processes can be conducted along the database lifecycle, i.e. even when the database owner updates his or her data (i.e. addition, suppression or modification of database elements). Experimental results carried out with the Paillier cryptosystem on a genetic database demonstrate that our method can efficiently detect different illegal data tamper with a high location precision.

Keywords

Confidentiality Data outsourcing Database watermarking Genetic data Homomorphic encryption Integrity 

Notes

Acknowledgements

This work has received a French government support granted to the Labex CominLabs and managed by the ANR in the “Investing for the future” program under reference ANR-10-LABX-07-01, and to the Labex GenMed, ANR-10-LABX-0013, through the project PrivGen.

References

  1. 1.
    Bellafqira, R., Coatrieux, G., Bouslimi, D., Quellec, G.: Content-based image retrieval in homomorphic encryption domain. In: 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 2944–2947 (2015)Google Scholar
  2. 2.
    Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. ACM Trans. Storage 2(2), 107–138 (2006)CrossRefGoogle Scholar
  3. 3.
    Almulla, S.A., Yeun, C.Y.: Cloud computing security management. In: 2nd International Conference on Engineering Systems Management and Its Applications, pp. 1–7 (2010)Google Scholar
  4. 4.
    Agrawal, R., Kiernan, J.: Watermarking relational databases. In: Proceedings of the 28th International Conference on Very Large Data Bases (VLDB 2002), pp. 155–166 (2002)CrossRefGoogle Scholar
  5. 5.
    Franco-Contreras, J., Coatrieux, G., Cuppens, F., Cuppens-Boulahia, N., Roux, C.: Robust lossless watermarking of relational databases based on circular histogram modulation. IEEE Trans. Inf. Forensics Secur. 9(3), 397–410 (2014)CrossRefGoogle Scholar
  6. 6.
    Wang, C., Wang, J., Zhou, M., Chen, G., Li, D.: ATBaM: an Arnold transform based method on watermarking relational data. In: International Conference on Multimedia and Ubiquitous Engineering, pp. 263–270. IEEE (2008)Google Scholar
  7. 7.
    Kamel, I., Kamel, K.: Toward protecting the integrity of relational databases. In: World Congress on Internet Security, pp. 258–261. IEEE (2011)Google Scholar
  8. 8.
    Prasannakumari, V.: A robust tamperproof watermarking for data integrity in relational databases. Res. J. Inf. Technol. 1(3), 115–121 (2009)Google Scholar
  9. 9.
    Guo, H., Li, Y., Liu, A., Jajodia, S.: A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. 176, 1350–1378 (2006)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Chang, J.N, Wu, H.C.: Reversible fragile database watermarking technology using difference expansion based on SVR prediction. In: International Symposium on Computer, Consumer and Control, pp. 690–693 (2012)Google Scholar
  11. 11.
    Coatrieux, G, Chazard, E., Beuscart, R., Roux, C.: Lossless watermarking of categorical attributes for verifying medical data base integrity. In: 33rd IEEE Annual International Conference of the Engineering in Medicine and Biology Society, pp. 8195–8198 (2011)Google Scholar
  12. 12.
    Memon, N., Wong, P.: A buyer–seller watermarking protocol. IEEE Trans. Image Process. Image 10, 643–649 (2001)CrossRefGoogle Scholar
  13. 13.
    Bouslimi, D., Coatrieux, G., Roux, C.: A joint watermarking/encryption algorithm for verifying medical image integrity and authenticity in both encrypted and spatial domains. In: IEEE Annual International Conference of the Engineering in Medicine and Biology Society, pp. 8066–8069 (2011)Google Scholar
  14. 14.
    Bouslimi, D., Bellafqira, R., Coatrieux, G.: Data hiding in homomorphically encrypted medical images for verifying their reliability in both encrypted and spatial domains. In: Engineering in Medicine and Biology Society. pp. 2496–2499. IEEE (2016)Google Scholar
  15. 15.
    Xiang, S., He, J.: Database authentication watermarking scheme in encrypted domain. IET Inf. Secur. 12(1), 42–51 (2017)CrossRefGoogle Scholar
  16. 16.
    Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47, 1423–1443 (2001)MathSciNetCrossRefGoogle Scholar
  17. 17.
    Xiao, L., Yen, I.L.: Security analysis for order preserving encryption schemes. In: 46th Annual Conference on Information Sciences and Systems (CISS), pp. 1–6 (2012)Google Scholar
  18. 18.
    Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, Jacques (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999).  https://doi.org/10.1007/3-540-48910-X_16CrossRefGoogle Scholar
  19. 19.
    Bakhtiari, S., Safavi-Naini, R., Pieprzyk, J.: Cryptographic hash functions: a survey, Technical report 95–09, Department of Computer Science, University of Wollongong (1995)Google Scholar
  20. 20.
    Radwan, A.G., AbdElHaleem, S.H., AbdElHafiz, S.K.: Symmetric encryption algorithms using chaotic and non-chaotic generators: a review. J. Adv. Res. 7(2), 193–208 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • David Niyitegeka
    • 1
    Email author
  • Gouenou Coatrieux
    • 1
    • 3
  • Reda Bellafqira
    • 1
  • Emmanuelle Genin
    • 2
  • Javier Franco-Contreras
    • 3
  1. 1.IMT Atlantique, Unité INSERM UMR 1101 LaTIMBrestFrance
  2. 2.Unité INSERM UMR 1078BrestFrance
  3. 3.WaTooBrestFrance

Personalised recommendations