Title: A complexity reduced and reliable integrity protection for large relational data over clouds

Authors: Waqas Haider; Muhammad Wasif Nisar; Tanzila Saba; Muhammad Sharif; Raja Umair Haider; Nadeem Muhammad Bilal; Muhammad Attique Khan

Addresses: School of Engineering and Information Technology, Australian Defence Force Academy, University of New South Wales, Canberra, Australia ' Department of Computer Science, COMSATS Institute of Information Technology, Islamabad, Pakistan ' Prince Sultan University, Prince Nasser Bin Farhan Street, Salah Ad Din، Riyadh 12435, Saudi Arabia ' Department of Computer Science, COMSATS Institute of Information Technology, Islamabad, Pakistan ' Department of Electrical Engineering, Linkoping University, 581-83 Linköping, Sweden ' Kent Institute of Business and Technology, Sydney, Australia ' Department of Computer Science, COMSATS Institute of Information Technology, Islamabad, Pakistan

Abstract: At present, governments and private business operations are highly dependent on relational data applications such as bank accounts, citizen registration, etc. These relational data dependent operations require reliable integrity protection while utilising the cloud computing storage infrastructure. Identification and recovery of stolen bits are a major assistance to the reliable integrity protection services for the sensitive relational data applications. To deal with the problems of detecting and recovering tampering in large relational data at minimum computational complexity, in this paper, N8WA (briefed in Section 2.1) coding-based scheme is presented. Overall the scheme is comprised of two cross functional modules. The first module is labelled as compact code generation using N8WA coding and code registration at registration module (RM). In the second module which is called accurate locating/restoring tampering, utilising the mismatching of different compact codes based on N8WA from RM, the major/minor tampered data is accurately located and restored. Investigational outcome indicates that the scheme ensures the computational complexity of O(n2) while minimum to maximum alterations is accurately localised and restored successfully.

Keywords: cloud data recovery; database integrity verification; digital tamper proofing; localisation; restoration; multiple data types; fragile watermarking; zero watermarking; lossless compression.

DOI: 10.1504/IJICS.2021.115347

International Journal of Information and Computer Security, 2021 Vol.15 No.1, pp.49 - 66

Received: 03 Oct 2017
Accepted: 07 Mar 2018

Published online: 01 Jun 2021 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article