Dynamic Watermarking-Based Integrity Protection of Homomorphically Encrypted Databases – Application to Outsourced Genetic Data
In this paper, we propose a dynamic database crypto-watermarking scheme that enables a cloud service provider (CSP) to verify the integrity of encrypted databases outsourced by different users. This scheme takes advantage of the semantic security property most homomorphic cryptosystems have, so as to embed a watermark into encrypted data without altering users’ data. The incorrect detection of the watermark, not only informs the CSP the database has been illegally modified but also indicates which data have been altered. In addition, the proposed scheme is dynamic in the sense the watermarking and integrity verification processes can be conducted along the database lifecycle, i.e. even when the database owner updates his or her data (i.e. addition, suppression or modification of database elements). Experimental results carried out with the Paillier cryptosystem on a genetic database demonstrate that our method can efficiently detect different illegal data tamper with a high location precision.
KeywordsConfidentiality Data outsourcing Database watermarking Genetic data Homomorphic encryption Integrity
This work has received a French government support granted to the Labex CominLabs and managed by the ANR in the “Investing for the future” program under reference ANR-10-LABX-07-01, and to the Labex GenMed, ANR-10-LABX-0013, through the project PrivGen.
- 1.Bellafqira, R., Coatrieux, G., Bouslimi, D., Quellec, G.: Content-based image retrieval in homomorphic encryption domain. In: 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 2944–2947 (2015)Google Scholar
- 3.Almulla, S.A., Yeun, C.Y.: Cloud computing security management. In: 2nd International Conference on Engineering Systems Management and Its Applications, pp. 1–7 (2010)Google Scholar
- 6.Wang, C., Wang, J., Zhou, M., Chen, G., Li, D.: ATBaM: an Arnold transform based method on watermarking relational data. In: International Conference on Multimedia and Ubiquitous Engineering, pp. 263–270. IEEE (2008)Google Scholar
- 7.Kamel, I., Kamel, K.: Toward protecting the integrity of relational databases. In: World Congress on Internet Security, pp. 258–261. IEEE (2011)Google Scholar
- 8.Prasannakumari, V.: A robust tamperproof watermarking for data integrity in relational databases. Res. J. Inf. Technol. 1(3), 115–121 (2009)Google Scholar
- 10.Chang, J.N, Wu, H.C.: Reversible fragile database watermarking technology using difference expansion based on SVR prediction. In: International Symposium on Computer, Consumer and Control, pp. 690–693 (2012)Google Scholar
- 11.Coatrieux, G, Chazard, E., Beuscart, R., Roux, C.: Lossless watermarking of categorical attributes for verifying medical data base integrity. In: 33rd IEEE Annual International Conference of the Engineering in Medicine and Biology Society, pp. 8195–8198 (2011)Google Scholar
- 13.Bouslimi, D., Coatrieux, G., Roux, C.: A joint watermarking/encryption algorithm for verifying medical image integrity and authenticity in both encrypted and spatial domains. In: IEEE Annual International Conference of the Engineering in Medicine and Biology Society, pp. 8066–8069 (2011)Google Scholar
- 14.Bouslimi, D., Bellafqira, R., Coatrieux, G.: Data hiding in homomorphically encrypted medical images for verifying their reliability in both encrypted and spatial domains. In: Engineering in Medicine and Biology Society. pp. 2496–2499. IEEE (2016)Google Scholar
- 17.Xiao, L., Yen, I.L.: Security analysis for order preserving encryption schemes. In: 46th Annual Conference on Information Sciences and Systems (CISS), pp. 1–6 (2012)Google Scholar
- 19.Bakhtiari, S., Safavi-Naini, R., Pieprzyk, J.: Cryptographic hash functions: a survey, Technical report 95–09, Department of Computer Science, University of Wollongong (1995)Google Scholar