在阴影中,我们信任:数据流的安全聚合容忍水印

A. S. Panah, R. V. Schyndel, T. Sellis, E. Bertino
{"title":"在阴影中,我们信任:数据流的安全聚合容忍水印","authors":"A. S. Panah, R. V. Schyndel, T. Sellis, E. Bertino","doi":"10.1109/WoWMoM.2015.7158149","DOIUrl":null,"url":null,"abstract":"In many applications such as sensor networks, e-healthcare and environmental monitoring, data is continuously streamed and combined from multiple resources in order to make decisions based on the aggregated data streams. One major concern in these applications is assuring high trustworthiness of the aggregated data stream for correct decision-making. For example, an adversary may compromise a few data-sources and introduce false data into the aggregated data-stream and cause catastrophic consequences. In this work, we propose a novel method for verifying data integrity by embedding several signature codes within data streams known as digital watermarking. Therefore, the integrity of the data streams can be verified by decoding the embedded signatures even as the data go through multiple stages of aggregation process. Although the idea of secure data aggregation based on digital watermarking has been explored before, we aim to improve the efficiency of the scheme by examining several signature codes that could also decrease the watermark detection complexity. This is achieved by simultaneous embedding of several shifted watermark patterns into aggregated data stream, such that the contribution of each data-source is hidden in the relative shifts of the patterns. We, also, derive conditions to preserve the main statistical properties of data-streams prior to the embedding procedure. Therefore, we can guarantee that the embedding procedure does not compromise the usability of data streams for any operations that depends on these statistical characteristics. The simulation results show that the embedded watermarks can successfully be recovered with high confidence if proper hiding codes are chosen.","PeriodicalId":221796,"journal":{"name":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"436 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"In the shadows we trust: A secure aggregation tolerant watermark for data streams\",\"authors\":\"A. S. Panah, R. V. Schyndel, T. Sellis, E. Bertino\",\"doi\":\"10.1109/WoWMoM.2015.7158149\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In many applications such as sensor networks, e-healthcare and environmental monitoring, data is continuously streamed and combined from multiple resources in order to make decisions based on the aggregated data streams. One major concern in these applications is assuring high trustworthiness of the aggregated data stream for correct decision-making. For example, an adversary may compromise a few data-sources and introduce false data into the aggregated data-stream and cause catastrophic consequences. In this work, we propose a novel method for verifying data integrity by embedding several signature codes within data streams known as digital watermarking. Therefore, the integrity of the data streams can be verified by decoding the embedded signatures even as the data go through multiple stages of aggregation process. Although the idea of secure data aggregation based on digital watermarking has been explored before, we aim to improve the efficiency of the scheme by examining several signature codes that could also decrease the watermark detection complexity. This is achieved by simultaneous embedding of several shifted watermark patterns into aggregated data stream, such that the contribution of each data-source is hidden in the relative shifts of the patterns. We, also, derive conditions to preserve the main statistical properties of data-streams prior to the embedding procedure. Therefore, we can guarantee that the embedding procedure does not compromise the usability of data streams for any operations that depends on these statistical characteristics. The simulation results show that the embedded watermarks can successfully be recovered with high confidence if proper hiding codes are chosen.\",\"PeriodicalId\":221796,\"journal\":{\"name\":\"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)\",\"volume\":\"436 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-06-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WoWMoM.2015.7158149\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WoWMoM.2015.7158149","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

摘要

在传感器网络、电子医疗保健和环境监测等许多应用中,为了根据聚合的数据流做出决策,需要不断地将来自多个资源的数据流式传输和组合起来。这些应用程序中的一个主要关注点是确保聚合数据流的高可信度,以便做出正确的决策。例如,攻击者可能会破坏几个数据源,并将虚假数据引入聚合的数据流,从而导致灾难性的后果。在这项工作中,我们提出了一种通过在数据流中嵌入几个签名代码来验证数据完整性的新方法,即数字水印。因此,即使数据经过多个聚合阶段,也可以通过对嵌入签名的解码来验证数据流的完整性。虽然以前已经探索了基于数字水印的安全数据聚合的思想,但我们的目标是通过研究几种可以降低水印检测复杂度的签名码来提高方案的效率。这是通过在聚合数据流中同时嵌入多个移位的水印模式来实现的,这样每个数据源的贡献就隐藏在模式的相对移位中。我们还推导了在嵌入过程之前保持数据流主要统计属性的条件。因此,我们可以保证嵌入过程不会影响依赖于这些统计特征的任何操作的数据流的可用性。仿真结果表明,如果选择合适的隐藏码,可以成功地恢复嵌入的水印,置信度高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
In the shadows we trust: A secure aggregation tolerant watermark for data streams
In many applications such as sensor networks, e-healthcare and environmental monitoring, data is continuously streamed and combined from multiple resources in order to make decisions based on the aggregated data streams. One major concern in these applications is assuring high trustworthiness of the aggregated data stream for correct decision-making. For example, an adversary may compromise a few data-sources and introduce false data into the aggregated data-stream and cause catastrophic consequences. In this work, we propose a novel method for verifying data integrity by embedding several signature codes within data streams known as digital watermarking. Therefore, the integrity of the data streams can be verified by decoding the embedded signatures even as the data go through multiple stages of aggregation process. Although the idea of secure data aggregation based on digital watermarking has been explored before, we aim to improve the efficiency of the scheme by examining several signature codes that could also decrease the watermark detection complexity. This is achieved by simultaneous embedding of several shifted watermark patterns into aggregated data stream, such that the contribution of each data-source is hidden in the relative shifts of the patterns. We, also, derive conditions to preserve the main statistical properties of data-streams prior to the embedding procedure. Therefore, we can guarantee that the embedding procedure does not compromise the usability of data streams for any operations that depends on these statistical characteristics. The simulation results show that the embedded watermarks can successfully be recovered with high confidence if proper hiding codes are chosen.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信