Title: A complexity reduced and reliable integrity protection for large relational data over clouds
Authors: Waqas Haider; Muhammad Wasif Nisar; Tanzila Saba; Muhammad Sharif; Raja Umair Haider; Nadeem Muhammad Bilal; Muhammad Attique Khan
Addresses: School of Engineering and Information Technology, Australian Defence Force Academy, University of New South Wales, Canberra, Australia ' Department of Computer Science, COMSATS Institute of Information Technology, Islamabad, Pakistan ' Prince Sultan University, Prince Nasser Bin Farhan Street, Salah Ad Din، Riyadh 12435, Saudi Arabia ' Department of Computer Science, COMSATS Institute of Information Technology, Islamabad, Pakistan ' Department of Electrical Engineering, Linkoping University, 581-83 Linköping, Sweden ' Kent Institute of Business and Technology, Sydney, Australia ' Department of Computer Science, COMSATS Institute of Information Technology, Islamabad, Pakistan
Abstract: At present, governments and private business operations are highly dependent on relational data applications such as bank accounts, citizen registration, etc. These relational data dependent operations require reliable integrity protection while utilising the cloud computing storage infrastructure. Identification and recovery of stolen bits are a major assistance to the reliable integrity protection services for the sensitive relational data applications. To deal with the problems of detecting and recovering tampering in large relational data at minimum computational complexity, in this paper, N8WA (briefed in Section 2.1) coding-based scheme is presented. Overall the scheme is comprised of two cross functional modules. The first module is labelled as compact code generation using N8WA coding and code registration at registration module (RM). In the second module which is called accurate locating/restoring tampering, utilising the mismatching of different compact codes based on N8WA from RM, the major/minor tampered data is accurately located and restored. Investigational outcome indicates that the scheme ensures the computational complexity of O(n2) while minimum to maximum alterations is accurately localised and restored successfully.
Keywords: cloud data recovery; database integrity verification; digital tamper proofing; localisation; restoration; multiple data types; fragile watermarking; zero watermarking; lossless compression.
DOI: 10.1504/IJICS.2021.115347
International Journal of Information and Computer Security, 2021 Vol.15 No.1, pp.49 - 66
Received: 03 Oct 2017
Accepted: 07 Mar 2018
Published online: 01 Jun 2021 *