Unlock instant, AI-driven research and patent intelligence for your innovation.

Outsourced database enquiry and verification method based on fragile watermark

A technology of fragile watermarking and verification method, applied in electrical digital data processing, instruments, program/content distribution protection, etc., can solve the problems of inability to further achieve tampering, positioning, qualitative and even data recovery, huge overhead, and data integrity damage.

Inactive Publication Date: 2010-06-02
NANTONG UNIVERSITY
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 1) Redundant verification information generally involves more complex data structures and signature calculations, and redundant verification information added to valid data increases additional network communication load;
[0009] 2) Once it is verified that the data integrity has been damaged by using redundant verification information, the current detected data can only be discarded, and the positioning, characterization and even data restoration of tampering cannot be further realized;
[0010] 3) When the data is even slightly updated, the complete redundant verification information must be recalculated, which is a huge overhead;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Outsourced database enquiry and verification method based on fragile watermark
  • Outsourced database enquiry and verification method based on fragile watermark
  • Outsourced database enquiry and verification method based on fragile watermark

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] Such as figure 1 As shown, this is the basic structural model of the fragile watermark-based outsourced database query verification method of the present invention. The two most critical components in this model are the watermark embedder and the watermark detector, which are the programs that run the fragile watermark embedding algorithm and the fragile watermark detection algorithm respectively, and are located in the data owner client and the database user client respectively. According to the structural model, the outsourced database query verification method based on the fragile watermark of the present invention is:

[0067] The data owner first uses the key to run the fragile watermark embedding algorithm on the data that needs to be stored or updated to embed the fragile watermark in the data, and then submits the data with the fragile watermark embedded to the outsourced database server for storage;

[0068] When using data, database users first submit a query...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an outsourced database query and verification method based on fragile watermarking; the method is as follows: a data owner uses a secret key to operate a fragile watermarkingalgorithm on the data which needs storage or update and embeds the fragile watermarking on the data, then the data embedded with fragile watermarking is submitted to an outsourced database server forstorage; after a database user submits a query request to the outsourced database server, the key provided by the data owner is used to operate the fragile watermarking detection algorithm on the returned query data and validates the authenticity of the data. The outsourced database query and verification method based on fragile watermarking has the advantages of small redundant storage capacity and additional load of network, good concealment of information validation with difficulty in deletion, small granularity of tampering position, etc. and can overcome the disadvantages of using redundant control information to carry out outsourced database query and verification.

Description

technical field [0001] The invention belongs to the technical field of computer information security, and relates to an outsourced database query verification method, in particular to a fragile watermark-based outsourced database query verification method, which is widely used in e-government and e-commerce information publishing systems to protect the integrity of important information content. Background technique [0002] Outsourced database, also known as "Database as a service", was first proposed by Hakan Hacigumus of the University of California, Irvine at the 2002 ICDE conference. In the outsourced database model, the organization outsources its own database business to a remote database service provider, and the outsourced service provider provides data owners and database users with remote database creation, storage, update, query, and database server hardware and software maintenance and upgrade services. To some extent, the outsourcing database model can realize...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/16
Inventor 朱勤陈建平王杰华陈继红陆建新
Owner NANTONG UNIVERSITY