Open Access Paper
24 May 2022 Traitor tracing scheme for relational databases based on blockchain
Weiqiang Jiang, Kedi Yang, Youliang Tian
Author Affiliations +
Proceedings Volume 12260, International Conference on Computer Application and Information Security (ICCAIS 2021); 122600A (2022) https://doi.org/10.1117/12.2637501
Event: International Conference on Computer Application and Information Security (ICCAIS 2021), 2021, Wuhan, China
Abstract
The traceability of data leakage remains a foundational challenge faced by big data. Traditional data tracing technology is mainly based on digital fingerprint to embed lengthy code into digital works such as video, while the structured data with limited embedding space has not been given adequate consideration. In this paper, we propose a chameleon short signature by improving Khalili’s chameleon hash function and combining Boneh’s signature algorithm to achieve a one-to-many signature with a shorter message length under the same security premise. Then, we construct a traitor tracing model based on the proposed signature and design a cascade chain to complete credible data sharing and undeniable leaker detection. Security and simulation analysis show that the traitor tracing model achieves trusted data sharing and efficient traitor tracing for structured data.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Weiqiang Jiang, Kedi Yang, and Youliang Tian "Traitor tracing scheme for relational databases based on blockchain", Proc. SPIE 12260, International Conference on Computer Application and Information Security (ICCAIS 2021), 122600A (24 May 2022); https://doi.org/10.1117/12.2637501
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Data modeling

Detection and tracking algorithms

Computer security

Data centers

Databases

Information security

RELATED CONTENT


Back to Top