Abstract

With the emerging growth of digital data in information systems, technology faces the challenge of knowledge prevention, ownership rights protection, security, and privacy measurement of valuable and sensitive data. On-demand availability of various data as services in a shared and automated environment has become a reality with the advent of cloud computing. The digital fingerprinting technique has been adopted as an effective solution to protect the copyright and privacy of digital properties from illegal distribution and identification of malicious traitors over the cloud. Furthermore, it is used to trace the unauthorized distribution and the user of multimedia content distributed through the cloud. In this paper, we propose a novel fingerprinting technique for the cloud environment to protect numeric attributes in relational databases for digital privacy management. The proposed solution with the novel fingerprinting scheme is robust and efficient. It can address challenges such as embedding secure data over the cloud, essential to secure relational databases. The proposed technique provides a decoding accuracy of 100%, 90%, and 40% for 10% to 30%, 40%, and 50% of deleted records.

Highlights

  • With the tremendous growth of digital content in recent decades, data sharing and distribution of digital content over the Internet have become a frequent practice in this digital age

  • This paper provides a concise analysis of the challenges facing the cloud community

  • We proposed a novel fingerprinting technique for the cloud environment to protect numeric attributes in the relational database for digital privacy measurement

Read more

Summary

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds

Mehvish Fatima 1 , Muhammad Wasif Nisar 1, Junaid Rashid 2,* , Jungeun Kim 2,*, Muhammad Kamran 3 and Amir Hussain 4.

Introduction
Related Work
Proposed Methodology
Attacks on Relational Database
Systematic Analysis of the Proposed Approach
Selection of Subset Data
Fingerprint Bits Generation
Fingerprint Embedding
Fingerprint Decoding
Comparison and Analysis
Experiments and Results
Collusion Attack
Modification Attack
Insertion Attack
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call