A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (2024)

1. Introduction

With the tremendous growth of digital content in recent decades, data sharing and distribution of digital content over the Internet have become a frequent practice in this digital age. On-demand availability of different services (i.e., hardware, software, and network-based services) brought revaluation in the IT industry. It becomes possible with the arrival of the concept of cloud computing. Cloud computing is an automated shared environment of configurable computing resources and has gained popularity in the last two decades [1]. It is an emerging paradigm of information processing storage and distribution to various nodes. Cloud enables the client to access the resource pooling when successfully executing the demand for services.

Cloud computing is revolutionizing the information technology industry by enabling access to their infrastructure and application services on a subscription basis. However, data copying and customizing data ability is like promoting intellectual property rights violation. At the present time, data security in the cloud environment is a demanding area of research. Different security measures enable the owner to secure his digital property, such as copyright protection, which is a form of intellectual property law that protects the original work of the author [2]. The technology faces the challenge of knowledge prevention, ownership right protection, security, privacy measurement of valuable and sensitive data because illegal copying, violation of ownership, and data burgled become a security issue. The data breach instance is caused by the inside thread, in which confidential and sensitive data has been viewed, stolen, and illegally distributed by a distinct individual by any organization. Data breaches may encompass professional secrets, health information (HI), personally identifiable information (PII), and other intellectual property. Unique customer identification marks are embedded in the data to detect illegitimate documents.

The identification of unique customer identification in terms of watermark data is known as fingerprinting F . This technique aims to protect the copyright and piracy of digital property from illegal distribution. It ensures effectiveness, particularly while passing out the process from attacker channels. Fingerprinting covers a wide variety of data formats used in various application areas [2,3,4,5,6,7,8,9]. This includes images audio [10,11] video [12], software [13,14], XML documents [9,15], geographic information system, relational database [8,16,17,18] etc. Fingerprinting ensures a security check to track the guilty traitor by embedding different fingerprints in each user relational database. Despite the growing popularity of cloud computing, security, privacy, and portability issues commonly exist in a relational database and other multimedia contents on the cloud environment. Security concerns are too demanding issues that create hurdles in the fast acceptance of the cloud for a relational database with a secure and shareable environment for on-demand service at the demand level of individual interests.

Digital fingerprinting is also called a digital signature. Digital signatures are used to demonstrate that a specific entity submits or approves specific data. Digital fingerprints are used to confirm that the data provided is correct. However, each copy of the document assigns a unique signature. It provides the highest security as a digital signature provides and is also useful in finding the guilty traitor.

This paper provides a concise analysis of the challenges facing the cloud community. These are affected online with the on-demand availability of the relational database. Moreover, it will show an effective approach to meet the existing challenges. In this paper, we proposed a novel fingerprinting technique for the cloud environment to protect numeric attributes in the relational database for digital privacy measurement. This fingerprinting scheme is capable of addressing security challenges for numerical data over the cloud. We presented a robust and efficient fingerprint scheme for a relational database capable of protecting and operating the database in real-time.

The rest of the paper is organized in the following sections. Section 2 discusses the existing fingerprinting techniques and their shortcomings. Section 3 discusses the research methodology, and Section 4 provides a systematic analysis of the proposed technique. Section 5 describes the attacker channel and the discussion, and Section 6 explains the comparison and analysis. Finally, Section 7 presents the experiments and the results with the overall conclusion in Section 8.

2. Related Work

With the rapid trend of cyber space usage, online accessibility of the relational database has become very common over the cloud environment. In [19], cloud base securities issues and vulnerabilities concerning cloud models were presented. The challenges to preventing sensitive data privacy issues are designed to ensure false insurance claims are handled in a manner authorized. Digital data may be in various formats like image, video, audio, natural language text, software, and relational database. These data types may expose to various types of attacks [8,18,20,21]. Agrawal [22] presented a classical algorithm of a watermarking primitive for relational data and proposed the bit-resetting algorithm. The proposed data scheme of the rightful owner is modified by embedding the selected bit in the least significant bit (LSB) ξ of the nominated attribute of the particular selected tuples. The selection of tuples is determined by computing some mathematical formulation with secret parameters. These secret parameters are only known to the true data owner. Secret parameters are encompassed using the candidate of attributes ν, least significant bits of nominated attribute ξ, a number of selected tuples γ, and fix length hexadecimal secret key K s , respectively. The H-hash function is used to decide the least significant bit (LSB), mark a given numeric nominated attribute of the selected tuples and be based on message authentication codes (MAC).

An abstract model of a QoS aware provider framework based on queuing theory is given [23]. Regarding the service rate, the model provides an optimal solution achieved by the optimization method. In [24], the layered architecture of the IoT network is presented, as well as comparisons of the cloud-computing and edge-computing paradigms. By altering the framework of the IoT (internet of things) network, network attacks can be carried out without contacting network systems. Various distributed cloud computing frameworks offer apparent advantages for computing big data in real-time or offline, and cloud computing is fault-tolerant and dependent on high YARN cluster management. The goal of availability is to prevent the node from going down. As a result, cloud computing plays a critical role in gathering energy data [25]. Task scheduling methods [26] are used to manage resources and provide the best possible quality of service (QoS). Any network architecture, such as the virtual IT data center, must have security as the top priority. Somewhere on the edge, security is focused on protecting data center endpoints from external threats and ensuring a secure gateway to the Internet [27]. Additionally, the Secure Data Transfer Scheme (S-DTS) can handle the transmission of scattered data across many clouds [28]. Blockchain technology is used to enable trust in various clouds and is also used for secure data [29]. The proper and secure data transmission in the mobile cloud is used to overload traffic and improve security [30].

MAC [31] is designed as a specific type of hash function. It is used to verify the authenticity and integrity of the given data. It depended on a key based on the hexadecimal system with a selected tuple, a primary key, and a secret key, respectively. Data hiding in the least significant bit is an efficient system. However, an attacker may simply remove the fingerprint bits by rounding off the numeric attribute values very quickly. Note that an interesting fact about our proposed method is based on updating of bit values for each iteration performed. This approach successfully decodes the fingerprint system by updating the attribute values. In the paper [15], the authors proposed the usability for preserving the algorithms of query optimization and generating collusion secure fingerprint codes that support the usability constraints against several attacks. The collusion is secure for secret codes to choose from a precise codebook. However, it does not use the existing work against noise tolerance (several attacks), limited availability of anti-collusion codes, inadequate for large datasets, and external memory usage.

Cryptographic functions are used to generate secure fingerprint codes. Boneh and Shaw [20,32], Guth [33,34], and in [21], adopted the composition of codes using fingerprint The construction of collusion randomized secure codes in a restricted way [20,32]. First, they constructed a code matrix and performed some random permutations on the columns of this matrix to generate unique cubic length codes. The shortcoming of the listed technique created the collusion-secure codes. Meanwhile, our proposed approach generated fixed-length secure codes with MD5 hash function for multiple users in the cloud environment. We will generate a fingerprint string in real time for each client to generate a request. In [35,36], develop a reversible data technique is developed to hide in audio using a statically computed histogram and hidden key.

In [37], authors presented cloud base securities issues and vulnerabilities concerning cloud models. In [38], the researchers anticipated the investigation for security uncertainty in a relational database watermark tuple. Two security models of watermarking were demonstrated regarding the leakage of secret watermarking, which contents are single-key multiple databases (SKMD) and multiple-key single databases (MKSD). Clouds are an emerging paradigm of shared and automated environment, where data is stored on remote servers and available to Internet users [39]. Cloud computing aims to provide various computing resource applications as a service on demand, hardware infrastructure, software applications, and network services. Everything from data centers to demands on user applications can be consumed on a pay-per-use basis [40].

In [41], presented the fingerprinting framework is presented in a cloud environment to identify the guilty agent, to protect digital content from illegal distribution. When successfully logged in to their cloud account, an authentic and verified user generates the request query to access the protected data. An automated system invokes the fingerprint manager two modules, and the parameters manager performs the fingerprinting generation and embedding. When a request is submitted to access, this computerized system initiates the fingerprinting process and invokes the fingerprint manager to generate a string of fingerprint bits. Each client uses their private information and passes it to the parameter manager, where all necessary parameters are stored. The integrity of the users is verified by the manager module and checks the user authenticity. If the authentic user is found and requested to access the digital content, the fingerprint process will proceed; otherwise, the system will deny it. The secret signature from a fingerprinted relational database of the majority voting scheme is applied.

The proposed technique is really on the original database and parameter module due to relying on original data. This technique is not blind and always requires the original dataset for the authenticity of the user. Furthermore, our proposed technique is semi-blind. The authors in [15] proposed the algorithm for usability preservation of collusion-secure fingerprinting that supports several attack usability constraints against several attacks. Therefore, fewer watermark bits have been discovered. In [10], it is not space-efficient and increases the complexity of scalability enhancement. It does not work against noise tolerance. Limited anti-collusion codes are available and it is inefficacious for large datasets.

3. Proposed Methodology

We considered a relational database represented by R Δ = P K , A 0 , A 1 , , A n 1 in terms of the scheme data. Here, PK is named as a primary key and ϑ P K attribute (in the absence of a primary key, an attribute is added to act as the unique attribute and auto-increment with the increment of new tuples) and A i i = 0 , , n 1 are the numeric attribute to nominate the required candidate for fingerprinting. Let there be n tuples in R Δ , a fraction 1 / r of which will be used for the encoding of the fingerprint, F, where “ r” is a user-defined parameter that is computed through the threshold formula given below. Since a robust watermarking scheme inevitably introduces small distortions to the data, it is assumed that each attribute value can tolerate modifications of at least least-significant bits (LSB) denoted with ξ. Table 1 describes all the parameters and notation.

Figure 1 demonstrates the proposed security model, and the block diagram summarizes all the core components of the fingerprinting technique. The ξ is a constant number and is independently used for an attribute value. Therefore, it depends on the number of binary digits of the attribute value. Figure 2 demonstrates the Sequential Workflow of the scheme in which fingerprint signatures are generated, embedded into the relational database. The proposed approach is used in a relational database for standalone systems, as well as in a relational database in the cloud. The traitor attack and decoding of fingerprints from the given database were used to identify the traitor. This block diagram summarizes all core components of the fingerprinting sequence of encoding decoding and traitor attack.

3.1. Cloud Computing Data Sharing Platform

Cloud computing is an automated shared environment. It provides a secure entrance for acquiring the restricted content with high authenticity. Private content is contained genuine information to access the desired digital information for secure purchasing to prohibit the distribution of the illegal copy of the digital information

This sensitive information may include important business documents. For example, a students’ result card, coupon numbers for a lottery, sales profit, income tax information, patient medical history, etc. This restricted content is used for those users who successfully cross the security and payment barrier, called a data-as-a-service. Moreover, data as a service provides on-demand and support to both data users and data providers at once. Microsoft Azure [42], Infochimps [43], Amazon [44], Oracle [45] are categorized as the most famous service provider to facilities the client at a low cost with 24/7 available and sustainability. Every service provider has its terms and conditions to provide access to needy users to obtain private content.

3.2. Security Model

Figure 3 shows the proposed security model. The proposed security model has thread and traitor identification.

3.2.1. Attacks on Relational Database

A fingerprint/watermark can quickly destroy or remove from the marked databases. Some of the common attacks that Mallory can make on these threads in the cloud environment are shown in Figure 3. The Mallory has various attack vectors, such as insertion, deletion, modification, and Collusion Attacks. Mallory gets multiple copies and compares them with false claim ownership attacks and brute-force attacks. When these attacks are applied to the fingerprinted database, the attacks change the fingerprinted database to a fragile database. Then, Mallory tries to claim that this database is his database. After that, we take this fragile database, pass it from the attacker channel, decode the embedded fingerprint, and apply majority voting. Finally, we identify the guilty traitor.

3.2.2. Collusion Attack

In this attack, Mallory may access various copies of the fingerprinted relational database, compare the differences among these copies, and remove all the signature values. The attacker applies the strategy of mix and match or majority counting to explode the fingerprint signals. This attack is specific to the fingerprint; all other attacks are related to both watermark and fingerprinting. Our proposed technique relies on this mix and match because some values do not change after embedding the fingerprint in selected rows. Mallory may skip these rows and be unable to perform the Collusion Attack. Our technique overcomes Collusion Attacks without losing the data quality.

3.2.3. False Claim of Ownership

In this attack, the traitor seeks to provide fake evidence to claim the owners to pirate the false evidence. Mallory adds his new fingerprint/watermark signature and attempts to claim wrong ownership in this kind of attack. Inveracity attack occurs when the attacker randomly changes some fingerprinted bits value and discovers values are guessing successfully. Ours proposed technique is also resilient against this type of thread because we apply fingerprints to selected tuples. The selection of these tuples is made with a calculated formula. Mallory adds fake fingerprints to a database to claim ownership. However, when we pass this database from the thread model and decode fingerprints from the fragile database, we can identify the theft.

3.2.4. Insertion Attack

In this insertion/additive attack, an attacker adds extra tuples into the datasets, assuming that the inserted signature is bothered, resulting in synchronization error. Moreover, Mallory considers the degradation of data quality and condition. However, it does not make any changes to the embedded fingerprint value in the relational database. We can decode the fingerprint with 100% decode accuracy and quickly identify the traitor.

3.2.5. Deletion Attack

First, Mallory aims to delete a subset of data from the relational database. Then, he tries to remove the fingerprint from the embedded data to destroy the data quality and conditions. When we pass this fragile database from the threat layer, our decoding identifies a traitor if Mallory removes 95% subsets of data. However, our technique is still robust even against 95% record deletion attacks.

3.2.6. Begin Updates

In this type of attack, some relational database processing performs unintentionally on fingerprinted/watermarked data. Therefore, Mallory adds some marked data deleted, inserted, alternated that may cause the fully or partially destroy the embedded watermark string. In our proposed scheme, a security key with secret parameters generates a combination of static and dynamic parameters. These parameters are IP/MAC addresses, UTC, login ID, and buyer ID. In addition, these parameters create different scenarios in real life. Therefore, Mallory does not guess the secret key and finds the exact tuple where the fingerprint has been embedded. However, our proposed technique is resilient against all kinds of modification and updates up to 95% of fingerprinted data.

3.2.7. Brute Force Attack

In this attack, Mallory tries every possible combination to guess the security signature and think about the secret parameters such as the secret key. The attack is prevented by assuming that the size of the secret parameters is long enough. For generating secret keys, static and dynamic combinations of parameters are used and generated in real-time. Whenever the user logins to generate the fingerprint, some parameters change according to the situation. Eight real-time situations can occur while the user is generating the fingerprint. These parameters are the IP address of the user, MAC address of the systems, UTC the Coordinated Universal Time, Buyer id that generated at the time of buying request, and the login id that is unique for every user on the cloud. We generate unique fingerprint strings with a user-specific parameter when a customer generates a request to access the dataset. We get fix 35-bits unique identification signature as the string for each customer. Signature generation, through our proposed mechanism, has the ability that an attacker cannot generate and crack the existing signature. We have a 35-bit string length with the possibility of a 34,359,738,368 combination. It takes too much time for Mallory to guess exact bits or run the burst-force attack. Another strong motivation for robustness is that we have embedded the whole signature string into each nominated attribute.

3.3. Real-Time Scenarios for Fingerprint Bits Generation

Different scenarios are observed on real-time usage of a cloud environment for a signature generation with multiple parameters to specify the user authentication. These parameters include some private and public parameters. The private parameters have only legitimate users, and public parameters are accounted for any other user’s knowledge, like an email address for a login account on the cloud environment. Login account J A Password, IP/MAC addresses A, UTC τ, and buyer id β or (order ID ψ) assigns at the time, successfully placing the order. Different schemes could happen in real life when we consider the parameters mentioned above. Secure and private parameters are used that are only known to the data owner. These are a hexadecimal security key k S , and cryptographic hash function H.

Framework for Fingerprint Bits Generation

Figure 4 shows the generation of a framework for the fingerprint bit generation.

Signature generation with multiple parameters to specify the user’s authentication is observed on a cloud environment real-time usage. These parameters include some private and public parameters. The private parameters are the constraints that the only legitimate user knows. Public parameters account for the knowledge of any other users or attackers, such as an email address for a login account on the cloud environment. Login account J A Password, IP/MAC addresses A, UTC τ, and buyer id β or (order ID ψ) assigns at the time, successfully placing the order. Different schemes could happen in real life when we consider the parameters mentioned above. The secure and private parameters are used that are only known to the data owner. These are a hexadecimal security key k S , and cryptographic hash function H. Table 2 lists the parameter variations for generations of fingerprints.

As listed in Table 2, various parameters participate in the generation of the fingerprint. On the left side of the table, five parameters directly belong to the cloud user. These parameters have two necessary states. Either they are unique S or different O in their function.

Scenario 1: When a client has used a unique buyer id, same IP and MAC address but logs in at a different time and login ID are used, which can be formatted as follows:

β S A Z O J A X O τ Y

Scenario 2: A user can access a cloud environment through their unique cloud login account J A with unique MAC and static IP address A of his system, and then may order to get specific information (database) from this cloud. An individual buyer ID β is assigned against each request generated by using to acquire the database. This scenario can be formulated as follows:

β S A Z S J A X O τ Y

Scenario 3: There is a buyer ID with a different IP/MAC address but the same login time and login ID. It can be formulated as follows:

β O A Z S J A X S τ Y

Scenario 4: Some buyer id has a different IP, MAC address, and login ID and but a diverse period, which can be formulated as follows:

β O A Z O J A X S τ Y

Scenario 5: There is some buyer id, which opens with different IP, MAC address, and login ID but logs in simultaneously, which can be formulated as follows:

β [ O ( A Z O ( J A Ǝ b D a d d Z D A X S T Y

Scenario 6: There is some buyer id, which has different IP and different MAC address, login ID, and login time, which can be formulated as follows:

β O A Z O J A X O τ Y

Scenario 7: There is some buyer id that has the same IP and MAC address, login ID, and same login time, which can be formulated as follows:

β S A Z S J A X S τ Y

Scenario 8: Some buyer id has the same IP and MAC address and login time but different login ID, which can be formulated as follows:

β S A Z O J A X S τ Y

3.4. Logical Data Partition

Dataset D is divided into “ m” nonoverlapping partition. This data partition does not change the data physical location; nevertheless, this data partition is based on logical grouping. Initially, the total numbers of subgroups are equal to the value of m and kept secret and only know the owner of the data to make the partition approach secure and resilient to the attacks. Finally, the subgroups are categorized into two major portioning bins, named even and odd partitioning bins. Even the m partition contains only those candidates whom zero remainders. Finally, the odd partitioning bin contains those nominated candidates who attribute to partition number one remainder.

3.5. Threshold Computation

The threshold value is computed to select the candidate attributes from the selected usability constrained as an attribute. The threshold is calculated to shortlist the candidate attributes for marking the digital signature. The noise in the data is reduced and provides high security to the end-user. It made it more difficult for an attacker to guess the nominated attribute value. Moreover, an important advantage of using an appropriate threshold is that it minimizes the desired distortion in the data, and the authenticity of the data remains. We consider that there is a minor capability in that we can make a few minor data changes that do not affect the originality of the data. Only those tuples whose candidate attribute value is greater than the threshold value are selected to insert into the shortlisted subdata set as the original sub-data set. This partitioning is used as logical, not physical. All tuples are inserted into this database when the candidate attributes value satisfies the threshold value.

3.6. Fingerprint Embedding

Our fingerprinting technique embeds a robust multi-bit fingerprint string identifier for each client in the numeric attributes of the relational database nominated tuples. The robust fingerprinting scheme aims to protect the database from illegal distribution, ownership proofing, and resilience against a wide range of attacks with 100% decoding accuracy. At that time, there is only one fingerprint tuple left after the attack. Fingerprinting is used to insert unique bit code for each buyer, which creates the smallest distortion or noise in relational data. There is an assumption that database clients can endure a small amount of noise. The Fingerprinting database is delivered multiple copies to multiple buyers. We present a scheme that overcomes the resultant minimum distortion technique.

3.7. Fingerprint Decoding

Fingerprint decoding is used to decode the embedded fingerprint bits F ˜ P String from the suspicious data. Fingerprint detection is raised in a possible scenario when Alice (data owner) accused that some data sets are illegitimately copied, redistributed, or tampered from her relation dataset R Δ . Alice or a third party verifies the ownership of the suspicious database through a fingerprint detection algorithm. The fingerprint decoding efficiency of a fingerprinting algorithm usually depends on the small bandwidth; the larger the bandwidth, the better the decoding accuracy. In other words, more fingerprint techniques are required against multiple attacks and vice versa.

3.8. Majority Voting

The majority voting procedure is performed. It aims to improve security and decoding accuracy against a wide range of malicious attacks.

3.9. Robust Analysis for Fingerprinting Scheme

Robust fingerprinting schemes aim to preserve digital contents from illegal copy detection, ownership proof, or copyright. Figure 5 shows the architecture of the proposed system.

A robust fingerprint identifies and validates the buyer information embedded into a numeric attribute of the relational database. It carries the guilty traitor by matching the decoding string to an array of embedding strings. A bit string embedded as a fingerprint is a meaningful sequence generated through the proper sequence. A meaningful pattern is an image, owner information, or an audio signal. The meaningless sequence can be a random bit or computed through the client information at run time with some private attributes such as secret key k S and cryptographic hash functions M D 5 . These meaningless string sequences are robust and provide to strengthen the property of the desired fingerprint. The Meaningless bit string is unpredictable and robust against a wide range of malicious attacks such as insertion, deletion, and updating attacks. The main objective of malicious attacks is to remove, make undetectable, untraceable, tampering the relational database. When a fingerprint is embedded in digital content, it may make some noise and data distortion in the original content. It produces an overall change in relational databases compute using mean μ and standard deviation σ before embedding the fingerprint bits and after completing the signature embedding procedure to the database.

Our proposed fingerprinting technique focuses on minimizing the noise produced by embedding the fingerprinting and overall data distortion. It is assumed that the relational database can tolerate a small amount of noise, which causes data distortion. In [8], the robust watermarking technique is presented to change the nominated attribute with some percentage change of the actual original data value. However, this may produce more distortion in the original value.

On the other hand, our proposed robust fingerprinting technique can minimize the distortion generated by embedding the fingerprint bits into the relational database numeric attribute. Another drawback of the existing technique relies on the original content value of the selected attribute of original data. Our proposed approach introduces an array containing some values independent of the original data and only known to the data owner or data protection rights authority. This file observed size is extremely small compared to the original database. Another aspect related to the robustness of the fingerprinting technique is the total bandwidth size available to mark the fingerprinting. A larger bandwidth means that it has more possibilities and spaces to embed the fingerprint string. The least bandwidth means that there are limited choices for the insertion of fingerprint, and it is not much more robust against malicious attacks by the attacker. A high degree of robustness is achieved by increasing usability constraints and the size of the relational database bandwidth.

4. Systematic Analysis of the Proposed Approach

A robust fingerprint algorithm is used to embed fingerprint bits into the dataset. The fingerprint embedding algorithm takes a secret key k S and the fingerprint bits F P as an input and converts a dataset D into fingerprint dataset DFP. The modifications (distortions) made by watermarking are bounded by the usability constraints matrix χ . Our technique is defined only once for every possible type of application that will eventually use the dataset. The fingerprint encoding process can be summarized in the following steps:

4.1. Data Partition

To initialize the embedding process, we first divide our relational dataset into a number of subgroups. Where m is a private constraint number known to the data owner, these partitions are nonoverlapping, and division is performed logically. The physical data position [33] remains similar, and it does not affect the appearance of the original dataset. This dataset is divided into m (e.g., m = 100 ) number of partitions, namely as P i = { P 0 , P 1 , …, P m 1 ,}. This logical division fulfills sets theory fundamental operations (e.g., union, intersection, and empty set). The intersection of different sets is observed empty because no common element lies in each partition. Each tuple belongs to only one partition as S i S j = Φ . It is also satisfied that the property of unions in which each partition is exhausted into the original dataset as P 0 P 1 P 2 P 3 P m 1 = D. This logical data partition holds the property that every sub-group contains at least one tuple in it. No data partition group can be empty as P i = Φ Several tuples in each partition are not necessary to be equal. Data partitioning was completed into two-level partitions. Data is partitioned formulated to categorize data into an “m” number of subcategories in level one. The final partition was then performed and every subgroup was categorized into two main categories for m = 0 and m = 1 . In the relational database, the primary key of every tuple is concatenated with the secret key k S and a cryptographic hash function. The secret key is the private parameter and is only known to the data owner. Generates the hexadecimal string depending upon the hash function type. We use the M D 5 (Message Digest 5) hash algorithm to provide extensive security and generate a 1a 28-bit hash value. After getting the hexadecimal value, the method value of m is considered. The value of m is also kept secret. It is categorized every row into m number of sub-groups. After completing the first level sub-grouping, divide every sub-group element into two levels of further partitioning. Algorithm 1 shows the data partition.

Algorithm 1. Data Partition
Input: R Δ , k S , P
Output: Data partitions P i = 1 m
1: for each r R Δ do
2: Calculate tuple subset r Δ r ( H ( r· ϑ| k S )) mod m
3: Insert r into P Δ r
4: end for
5: return P i

4.2. Selection of Subset Data

To minimize the distortion and noise in the original data, only selected tuples are nominated for fingerprint. The selection of attributes is based on usability constraints that the data owner defines. Usability constraints are used to control the usability of data loss, define by the merchants, and identify within the available bandwidth for fingerprint embedding. Bandwidth is the maximum capacity of a relational database where the data is located. The fingerprint decoding efficiency of a fingerprinting algorithm usually depends on this bandwidth; the larger the bandwidth, the better the decoding accuracy. In other words, the more fingerprint technique is more robust against multiple attacks and vice versa. The data recipient wants authentic and original data without any anomaly with minimum distortions. The merchant defines usability constraints to bind the alterations. To preserve the information, merchants define usability constraints in a relational database. Selected attribute constraints pick up based on the values that they contained. The resultant values perform increment or decrement operations on constrained attribute values. The mean and standard deviation of the final values did not change.

We compute the data selection threshold by the formula given in Equation (1) for attribute selection for selecting data for fingerprinting.

Γ = μ i × μ i ρ % σ i × c

Data partitions ( P 0 , P 1 , …, P m 1 ,) are given as input for data selection and database R ˜ Δ as the resultant output. Database R ˜ Δ contains only tuples whose value satisfied the threshold limit. For the fingerprint encoding process, only those tuples will insert into the database R ˜ Δ , whose attribute Ai is above threshold Γ. For each partition tuple in P 0 , P 1 , …, P m 1 , mean ( σ), some percentage value that is selected by choice of the user ρ % standard deviation ( μ) and the percentage value of the standard deviation μ i ρ %. The percentage value lies 0 to 100 and is defined by the data owner. The c is the confidence factor with a value between 0 to 1. The percentage value of the standard deviation μ i ρ % and c are kept secret. Enhance security mechanisms make it very difficult for an attacker to guess the selected tuples in which the fingerprint is inserted. These values are randomly defined by the data owner. The purpose of using two secret parameters is unable to guess the values of both parameters percentage value of the standard deviation μ i ρ % and confidence factor c correctly. It becomes impossible in every aspect for the attacker to calculate the threshold. The standard deviation performs threshold computation μ i multiply with the percentage of standard deviation μ i ρ % and divides with the resultant mean ( σ) multiply with the value of confidence factor c. Threshold value obtained from equation two and all attribute values greater than threshold Γ are saving into the database R ˜ Δ .

R ˜ Δ r A i > Γ

Fingerprint embedding is performed on these nominated attributes of selected tuples in the database R ˜ Δ and r A i are attributes for selected tuples. There is a presentation of the nominated attributes of selected tuples. They contain the attribute values from A i , 0 to n − 1 tuples and attributes columns and v referred to the value of these attributes R 0 as described in Equation (3).

A s A 0 = v 00 , v 10 , , v n 1 0

A 1 = v 01 , v 11 , , v n 1 1

A n 1 = v 0 n 1 , v 1 n 1 , , v n 1 n 1

The selected tuples R i as follows:

R 0 = v 00 , v 01 , , v 0 n 1 R 1 = v 10 , v 11 , , v n 1 1 R n 1

R 0 = v 00 , v 01 , , v 0 n 1 R 1 = v n 1 0 , v n 1 1 , v n 1 n 1

Algorithm 2 depicts the different steps of this phase.

Algorithm 2. Data selection
Input: R ˜ Δ Data partitions P 0 , P 1 , , P m 1 ,
1: for i = 0 to m − 1 do
2:  for each r A i P i , do
3: Compute μ and σ on A 𝒾
4:   Compute ρ % value of μ
5:   Calculate Γ using Equation (1)
6:  end for
7: end for
8: return R ˜ Δ r A i > Γ
Output: R ˜ Δ

4.3. Fingerprint Bits Generation

In this step, the F fingerprint bits are generated for each client when access requests are submitted in the cloud environment. Binary fingerprint strings are generated from client indication information based on IP address, MAC address A , date-time stamp UTC (Coordinated Universal Time) τ, login ID J A , and buyer ID β. These constraints are obtained in real time. Thus, Fingerprint string generation is calculated with the lowing function given below:

F P k S , β , A , τ , J A = F P

where “|” specifies the concatenation operation perform among buyer ID β i , IP MAC address, UTC date-time stamp τ, login ID J A with secret key k S and a cryptographic MD5 hash function to generate the fingerprint bits f 𝓅 0 f 𝓅 1 f 𝓅 2 f 𝓅 L 1 as shown in Equation (4).

F P = f 𝓅 0 f 𝓅 1 f 𝓅 2 f 𝓅 L 1

These bits are given as input to the fingerprint encoding function. The length of the fingerprint is L, where L is the fixed-length 128-bit has to value F P generated by the MD5 hash function.

F = 𝒾 = 0 L 1 f 𝓅 𝒾

Fingerprint generating function transform the hexadecimal (alphanumeric) string into a binary bit string f 𝓅 0 f 𝓅 1 f 𝓅 2 f 𝓅 L 1 .

Λ : f 𝓅 𝒾 F P

However, Λ this entails keeping all buyer-fingerprint codeword string f 𝓅 𝒾 in a database F P for decoding persistence. It leads to security overhead by keeping the fingerprint codes database secret to ruin a collision attack. Some security measures are essential to be enforced thus as to protect the database access control, password protection, and encryption. To overcome the security issues, the data owner generates a unique buyer’s fingerprint F P from the merchant’s secret key k S and the buyer’s series number β i (which can be public/private) using a cryptographic hash function H . A function H maps the data of arbitrary size string “ S” to data of fixed size string “ 𝒽” and the values returned by the hash function are called the hashes. Algorithm 3 shows the fingerprint generation.

H : S 𝒽

Algorithm 3. Fingerprint generation
Input: k S , β, IP, A, τ, and J A
Output: F
1: for i = i to 𝓃 do
2: f 𝓅 𝒾 = H τ | | H ( k S A | H k S | β
3: Insert f 𝓅 𝒾 into F
4: end for
5: return F

4.4. Fingerprint Embedding

The Fingerprinting algorithm uses the multi-bit algorithm. Multibit means that for each client, the length of the fingerprint is 0 to L-1 and embeds this bit string in the selected tuples of the nominated attributes of a database R ˜ Δ . For the sake of simplicity, we are assuming that partition set P i in database R ˜ Δ contains signal attribute v i P i . Our fingerprinting technique embeds a robust multibit fingerprint signature identifier for each client in the numeric attributes of the nominated tuples of the relational database. For signature embedding XOR Operation is performed between the fingerprint signature string and m. The fingerprint signature string is generated through algorithm two, and m is the logical partition number of level two. It computes the resultant bit. The result will be one of the sign bits, and the m bits are the same; otherwise, it will be zero. This step executes for L-1 several times, which is the actual length of the fingerprint signature. All collective bits are combined and stored in a resultant array F ^ . The length of this array is also equivalent to the fingerprint signature string. The resultant array preserves bits string for each buyer in it, and this array is kept by data owner or copyright monitoring authorities.

f : ( D , F P ) F Δ

The general encoding rule is defined in Equation (5).

f i = u i + v i f b i

Here, f i represents the fingerprinting coefficient equivalent to the original coefficient u i , v i denotes the fingerprinting strength, and f b i denotes the portion of the fingerprint signature.

Total data distortion that makes throughout the fingerprinting procedure, as

Δ ( R ˜ Δ R Δ )

Suppose the resultant array is the same as the least significant bit LSB of the nominated attribute for multi-bit fingerprint embedding. In that case, LSB ξ keeps remaining the same otherwise flip. Eliminate the least significant bit (LSB) after encoding and recheck the remaining bits in the fingerprint signature string. When there is zero left and halt embedding. Repeat this step for L-1 times and update the attribute value. Multibit fingerprint signature length is 0 to L-1 and computed collusion-free fixed-length signature string in a real-time scenario using Algorithm 2. Bit m will remain the same for a full fingerprint signature, as it is generated for the nominated attribute based on the primary key of the selected attribute. An identical fingerprint signature is applied to all nominated attributes of the selected tuple. Repeat the same applied procedure for all data partitions P i . It improved the protection level if an attacker successfully deleted or updated the fingerprinted attribute value and left only one fingerprinted attribute. Our proposed approach provides 100% decoding accuracy. Sometimes, it is critical in real life that data statistics do not contain anomalies. It may also require sensitive data that statistics such as mean and standard deviation resultant should equal or approximately, before and after the fingerprint signature embedding. Algorithm 4 explains fingerprint embedding.

μ R Δ μ F ^

σ R Δ σ F ^

Algorithm 4. Fingerprint embedding
Input: k S , R Δ , R ˜ Δ , β, F, Length of fingerprint L
Output: F Δ , F ^
1: for each row r in P 𝒾 do
2: Calculate Γ using Equation (1)
3: R ˜ Δ r A i > Γ
4: Generate f 𝓅 𝒾 F using Equation (2)
5: for each r in R ˜ Δ
6: compute m bit
7: m = 0 if 𝓅 𝒾 % 2 = 0
8: otherwise m =1
9: K 𝒾 = m f 𝓅 𝒾
10: compute F ^ K 𝒾
11: end for
12: SET K 𝒾 to LSB ξ of rA i , where K 𝒾 = L
13. end for
14. Return F Δ , F ^

4.5. Fingerprint Decoding

Fingerprint decoding decodes the embedded fingerprint bits string from suspicious data sets that are illegitimately copied. The data partitions are generated using the same steps to perform fingerprint encoding to generate a data partition algorithm as in the fingerprint encoding phase.

4.5.1. Decoding Strategies

Fingerprint decoding can be public or private, depending on security requirements. A blind decoding algorithm does not require an embedded fingerprint or any part of the original data. The marked attribute(s) and tuple(s) are identified, and this submodule decodes fingerprint bits. The fingerprint decoding phase detects fingerprint string from a suspicious database to identify the traitor user. For detecting, the same preprocessing step and formulations are performed to start the decoding process. These prepossessing steps are the same as a repeat in embedding phase, logical data partitioning, threshold computation, selection of nominated attribute, calculate the value of m two-way partition, selection of string from the resultant array, and length of the resultant array F P . XOR function is performed between the resultant array and m and computes fingerprint bits. Fingerprint bits are generated the same as the length 0 to L-1 and this step is repeated L times. Suppose that the resultant bit and m bit are the same and the generated fingerprint bit is equal to the least significant bit of the attribute value. In that case, there is no change in the least significant value of the nominated attribute. Otherwise, flip the least significant bit of the nominated attribute. Store fingerprint bit 𝒻 𝓅 𝒾 in an array F ˜ P i . When 𝒻 𝓅 𝒾 value is 0, make increment in the figure of zero else one.

4.5.2. Majority Voting

To decode the final embedded fingerprint information appropriately and efficiently majority voting mechanism is performed. It aims to make better security and decoding accuracy against a wide range of malicious attacks. In the end, majority voting is performed and that the number of zero in the array F ˜ P i are greater than one was verified, then set F ˜ P i a value equal to 0; otherwise, one. Match the detected fingerprint string with the stored fingerprint and return the traitor information, the guilty user, and distribute illegal copies of the database. Fingerprint decoding is used to decode the embedded fingerprint bits string from the suspicious data. Fingerprint detection is raised in a possible scenario when the data owner is accused that some datasets are illegitimately copied, redistributed, or tampered from her relation data R. The fingerprint decoding efficiency of a fingerprinting algorithm usually depends on this bandwidth. The larger the bandwidth, the better the decoding accuracy. In other words, more fingerprint techniques make them more robust against multiple attacks. Algorithm 5 describes fingerprint decoding.

Algorithm 5. Fingerprint decoding
Input: Fingerprinted Database D F P , Secret Key k S , Resultant array F P
Output: Decoded Fingerprint F ˜
1: Ones = 0, Zeros = 0
2: for each partition 𝓅 𝒾 , do
3: R ˜ Δ Calculate Γ
4: compute m bit for each r A i
5: for 𝒾 = 0 to L 1
6:  for each row r in D ˜ , do
7:    𝒻 𝓅 𝒾 = m K 𝒾
8:    if (( K 𝒾 = = 0 & & m = = 0 ) ( K 𝒾 = = 1 & & m = = 1 ))
9:       if ( ξ = = 𝒻 𝓅 𝒾 )
10:    No change
11:      else
12:      Flip ξ bit
13:    F ˜ P i 𝒻 𝓅 𝒾
14: If F ˜ P i = 0
15:     Z e r o s = Z e r o s + 1
16: Else O n e s = O n e s + 1
17: end for
18:  I f ( Z e r o s > O n e s )
19:   F 𝒾 ˜ F ˜ P i = 0
20: else
21:  F ˜ P i F 𝒾 ˜ = 1
22:  F ˜ F i ˜ F ˜ P i
23: end for
24: Return F ˜

5. Attacker Channel and Discussion

A fingerprinting technique must have the capability that it is unable to locate by the intruder and significantly degrade the quality of data if the intruder tries to corrupt the fingerprint. Our scheme’s fingerprints are detectable and robust against different types of attacks generated on the fingerprinted data, including Collusion Attacks. We demonstrate the robustness of our scheme under a wide range of descriptive attacks. Among those attacks, some are common to fingerprinting and watermarking, while Collusion Attacks are unique to fingerprinting. Our proposed solution is vulnerable to a collision attack in which buyers collaboratively compare their data copies, disrupt the underlying fingerprints, identify differences of embedded marks, and modify their fingerprints. Our proposed scheme is resilient against various attacks, especially Collusion Attacks and minimum distortions in the original dataset. As shown in [22], the embedded marks may be ruined by making significant modifications to marked data. Therefore, the robustness of our scheme is considered relative to the data modifications made by attacks and updates. We analyze our fingerprinting scheme using the following robustness measures. We say that a binary string is a valid fingerprint if it is of the form F ( K s | β i ) (0 ≤ n < β i ). A detected fingerprint is incorrect if it is not the one that was used in the insertion of the fingerprint.

Now, we judge the effectiveness of our proposed scheme against a wide variety of attacks. Many attacks are common in watermarking and fingerprinting, such as intersection, deletion, and updating, and some are only related to the fingerprinting as a Collusion Attack.

The attacker inserts some new tuples at any place in a relational database to affect the existing fingerprint mark in the relation database R Δ , also called blind insertion. Inserting new tuples is used to disturb the sequence of embedded fingerprint bits that produce a synchronization error. We overwhelmed this synchronization error by using the primary key. Whenever new tuples are inserted, the auto-numbers series is followed throughout the relational record. Our fingerprint embedding scheme is implemented through partitioning of primary keys and logical data based on secret parameters such as secret key ks and the number of partitions m. A primary key cannot contain a repeating value and cannot be null. Therefore, it ensures that the order of tuples does not disturb the embedded fingerprint and the insertion of new tuples based on the primary key. The addition of new tuples increases the probability of false-positive rates. Insertion of non-fingerprinted new tuples can result in an increasing amount of false-positive rate. The insertion attack is also attacked to break the fingerprint structure of the embedded fingerprint. However, our proposed approach is resilient to the insertion attack. We embedded a full string in every partition. If only one tuple is left, our proposal can decode efficiently. Every tuple must have the primary key. So, the insertion of new records does not affect our fingerprinted data. The decoding accuracy remains 100% after inserting some new tuples.

Collusion Attacks belong to fingerprinting and consider an active attack. Malicious purchasers may collude to compare their fingerprinted versions. When multiple fingerprinted copies are distributed, Fingerprinting schemes are exposed to Collusion Attacks. In which attacker colitis, several fingerprinted copies of the document with a different signature. The associate peoples of a coalition may create a good data copy that does not implicate any coalition member. During fingerprint detection, either the copy may yield an innocent buyer fingerprint, or it may not yield a valid fingerprint. The collision attack is specific to fingerprinting, and there is no Collusion Attack in the watermarking setting. Resistance to Collusion Attacks can be critical in a fingerprinting application

By locating the positions where the documents differ, one can discover where the fingerprint bits are inserted. Modifying documents on these positions may obtain a new version without a readable fingerprinted document, escaping detection. For example, an attacker can open copies in the cloud environment to obtain any number of differently fingerprinted copies. Our proposed scheme uses multiple constraints for the generation of fingerprints and inserts through the hash function. The hash function is used to identify the attribute for each row where it inserts a fingerprint mark. We use bit generation Algorithm 2 to generate the attribute sequence to be marked for each buyer. As a result, the insertion pattern is randomized for each buyer. Hence, the fingerprint copies for different buyers of the same databases are so different that they cannot collude to find the insertion places of fingerprint marks.

Sometimes this attack is called a subset attack. This attack adversary aims to destroy the embedded fingerprint by selecting and deleting some tuples, either randomly or selected based on some statistical operations of attribute values, from the fingerprinted dataset DFP. The decoding algorithm task is to recover the fingerprint from the remaining tuples in each partition. Suppose adversary drops N tuples from Alice’s fingerprinted dataset [22]. We are assuming that the attacker does not know the portioning position of the tuples where the fingerprint was embedded, and also has not accessed the embedding secret key K s .

In such an attack, the modification value of the data destroys the embedded fingerprinted marks. Attackers modify the value by flipping bits, rounding off the value, and alternating subset and superset. Attackers can modify the value by flipping bits and rounding off the value, subset, and superset alterations. Modification of values is performed the same as the usual data modification of data. However, more modifications mean more distortion in data. In crucial and other sensitive data, there is not much flexibility to accept the changes. Otherwise, the data will be useless. Modifying the selected fingerprint data increases the chances that attackers achieve their goal and successfully destroy the fingerprinted information. However, in our proposed technique, we use some secret parameters that make it difficult for an attacker to guess the exact nominated attribute. Bit attacker is based on a random selection of tuple attributes to change the bit value. There is also the possibility that the attacker changes the randomly selected bits to zero, also called zero-out the attack. Round-off the numeric data to remove the embedded signature is a kind of attack. The attacker seems to remove the signature bit with whole data and round-off the value. To make this attack effective, the attacker must estimate the correct figure of how many bits are involved. Data become useless and destroy data usability when the attacker overestimates the value. Underestimated has no significant effect on data and the embedded signatures.

6. Comparison and Analysis

This section shows the resilience against different types of attacks discussed in this research. In a deletion attack, the fingerprint attackers destroy the inserted fingerprint from the provided dataset by deleting some records. A fingerprint architecture protects relational data against duplication and transmission [41]. It guarantees that a user can only access data that contains their unique identifier. When a user accesses a database, the fingerprint process is activated, according to the technique. An administrator module performs fingerprinting activities using multiple fingerprinting functions, but these functions are vulnerable and change data values, making it difficult to identify a complicit agent because the administration component also verifies the authentication using these specifications. In [19] implies that if a change is made to the database for the insertion of messages, the normal interpretation of the data will not be interrupted. However, to account for distortion-based methods of watermark interpretability, consider distortion constraints.

The proposed technique results are higher against Zhou [41] and Gue [19] on resilience to this attack. The 95% of the tuples are deleted, and the fingerprint is ultimately detected. The attacker erases the embedded fingerprints and deletes more than 95% of the fingerprinted relation, which means he will lose almost the whole association. We conclude that this attack is not sufficient for the attacker. Suppose that the attacker examines each tuple independently and selects it with a probability pd for inclusion from the pirated relation. For the attack to be successful, it must delete all embedded bits for at least one fingerprint bit. We know that each fingerprint bit is embedded multiple times, so the probability that all the embedded bits for fingerprint(fp) are deleted. Figure 6 shows the result of decoding accuracy from the fingerprinted relation obtained by randomly selecting and deleting different ratios of tuples for the simulation of this attack.

Figure 7 shows the decoding accuracy of the fingerprinted relation obtained by randomly selecting different ratios of the fingerprinted relation and toggling the least significant bits (LSB) for all their attributes and modifying LSB with other closest values with some increment or decrement. The 95% of the tuples are randomly altered, the fingerprint can be detected completely. It shows that for the attacker to erase the embedded fingerprints, they should alter more than 95% of the fingerprinted relation, causing a perceptible change to the pirated relation. In the majority voting, fingerprint detection does not detect fingerprint bit (fp). Therefore, the probability of the fingerprint bit is not recovered.

A fingerprinting scheme should be robust against malicious attacks. However, the effect of these updates on the fingerprint detection process is limited to the minimum. It should be made hard for the attacker to modify the embedded fingerprint so that the innocent owner will not need to claim his ownership rights of relation, nor will they be considered a pirate. Figure 8 shows the decoding accuracy of the fingerprinted relation obtained by randomly selecting different ratios of the fingerprinted relation, mixing them with tuples from other sources, and inserting them into a relational database. We can see that the detection rate is approximately 90% when the attacker modifies 50% of the embedded fingerprints.

7. Experiments and Results

This section performed some experiments and analyzed the results to validate the robustness of our proposed technique. All experiments are performed on the SQL server 10.0 on Windows 10 PC with Intel (R) Core (TM) i3-2310M CPU 2.10 GH, 10 GB of RAM, and 500 GB hard drive. The C# is used as a programming language, and Dropbox as a cloud environment. The proposed approach is easily utilized for any relational database. Our approach does not depend on the size and nature of the database because the database is logically divided and its size does not matter. We obtained a dataset of liver disorders from the UCI directory [46]. We selected 10,000 numbers of tuples and seven attributes. We shortlisted the fingerprinting length of 35 bits binary string from a variable-length string. Another total number of partitions m = 100. The percentage change of value 𝓅 % is 37% (1 to 100), and c is the confidence factor is 0.004 (0 to 1). Moreover, the threshold value is calculated through the threshold formula, and only the optimal value selects that value is greater than the calculated threshold. Our proposed technique is resilient against various attacks and demonstrates through experiments and malicious databases the ability to identify guilty traitors.

7.1. Analysis of Attacks

7.1.1. Deletion Attack

In this attack, the adversary drops some tuples intending to disturb the structure and sequence of embedded fingerprints in the relational dataset. The attacker accomplishes the tuple deletion mission to remove the fingerprint bits. It depends either on some statistical calculation or randomly picked attributes. For example, suppose the attacker drops a number of tuples from the Alice dataset and change ℵ number of values every time to analyze the effect on decoding accuracy. Figure 9 shows the decoding accuracy with the threshold base [1] fingerprinting technique. Our technique provides 100% decoding accuracy when the attacker drops more than 95% of the tuples. Moreover, when only one marked tuple is left in any partition of the relational database. Figure 9 shows the modification deletion attack and circle represent the accuracy percentage.

Furthermore, our approach is not dependent on any mark value of tuple. We had presented the selection and picking of tuples on logical partitioning, and all those values are selected whose value is greater than the computed value of the threshold. This value selection and shortlisting mechanism for tuple make it more effective and resilient against synchronization error. Furthermore, we utilized the primary key to overwhelming this kind of errors. Our finding analysis for robustness is observed when the attacker dispels an extremely high tuple drop attack that affects the value of mean μ and standard deviation σ . Our technique protects against such a scenario, as our proposed technique decoding accuracy is independent of usability constraints.

7.1.2. Collusion Attack

In this attack, the attacker obtains multiple copies of the fingerprinted document and tracks the difference between these documents. The attacker attempts to prove his ownership by destroying the embedded fingerprint and inserting his signature to claim ownership. However, our fingerprint signature generation mechanism is secure and robust against Collusion Attacks. This attack is specific to fingerprinting. We generate unique fingerprint strings with a user-specific parameter when a customer generates a request to access the dataset. We obtained a 35-bit unique identification signature for each customer’s string. Signature generation, through our proposed mechanism, has the ability that an attacker cannot generate and creak the existing signature. We obtained 35-bits string length 34,359,738,368 combination. The attacker does not guess the exact bits or run the burst-force attack. Another strong motivation again is robustness, that we have embedded the whole signature string into each nominated attribute.

7.1.3. Modification Attack

The traitor modified the attribute value to destroy the embedded fingerprint signature. Our technique can decode these signatures with 100% decoding accuracy because our approach does not depend on the attribute value. Meanwhile, the techniques [19] depend on attribute values and decoding accuracy offended when the attacker achieves the goal of finding and updating all the fingerprinted attributes in the fingerprinted document. Figure 10 shows the modification attack and small circle showing the percentage of accuracy.

7.1.4. Insertion Attack

The attacker inserts new tuples to make the data distorted and noisy. There are several ways in which an attacker inserts the new tuple into the fingerprinted document. For example, there is a possibility that he inserts a new tuple at the end of the document. He might also insert a few tuples in random locations and duplicate the existing tuple in the relational database. Figure 11 shows the modification insertion attacks. These small circles represent the percentage accuracy. Our proposed technique is resilient for each type of insertion. We embedded the fingerprint signature based on the primary key and logical partitioning of the relational database. When an attacker inserts a new tuple with any insertion mechanism he used, a unique primary key will be assigned to each tuple. It is the properties of a primary key that cannot be duplicated or contain a null value. Our proposed approach decodes the signature with 100% accuracy when the attacker doubles the volume of the dataset.

8. Conclusions

This paper proposed an effective, reliable, and automated solution to protect precious numeric relational data in the cloud for illegal duplications, traitor identification, and redistributions. We presented a robust fingerprinting technique for relational databases with minimum distortion in the original database and bandwidth-independent decoding accuracy. We provided a unique signature generation mechanism for each buyer in real-time. The fingerprint embedding process is used to embed an arbitrary bit string as a fingerprint pattern using the secret key and the cryptographic hash function. The fingerprint decoding algorithm extracts the embedded bit string of the fingerprint. Our Proposed fingerprinting algorithm is highly resilient against various attacks; Insertion, Deletion, Alteration, Bit-flipping attack, and Collusion Attack, and presents a blind reversible scheme. The proposed scheme provides the database owner ownership authorization and attains full recovery of the original database relation once the fingerprint is detected and authenticated. We can tackle the combination of multibit fingerprints with collusion-resistant code generated through the buyer’s ID. Our fingerprinting scheme’s nature is asymmetric and provides a unique on-demand copy of data to requested buyers. Merchant uses the same identification marks for the detection process; to prove to a third party that the data is pirated and that the pirated data is sold to a specific buyer.

Further research should also investigate categorical, alphanumeric attributes, and non-numeric encoding domains, a logical extension of this research.

Author Contributions

Conceptualization, M.F., M.W.N., M.K., J.R. and J.K.; data curation, M.F., M.W.N., M.K., J.R. and J.K.; formal analysis, J.R., J.K. and A.H.; funding acquisition, J.K. and J.R.; investigation, J.R., J.K. and A.H.; methodology, M.F., M.W.N., M.K. and J.R.; project administration, M.F. and J.R.; resources, M.W.N., J.R. and M.K.; software, M.F. and M.K.; supervision, M.W.N., M.K. and J.R.; validation, M.F.; visualization, M.F., J.R. and J.K.; writing—original draft, M.F., M.K., M.W.N. and J.R.; writing—review and editing, M.F., J.R., J.K., M.W.N., M.K. and A.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Technology development Program of MSS [No. S3033853].

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing is not applicable to this article as the authors have used publicly available datasets whose details are included in the “experimental results and discussions” Section 5 and Section 7 of this article. Please contact the authors for further requests.

Acknowledgments

The authors thank the anonymous reviewers who helped to improve the quality of the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Mell, P.; Grance, T. The NIST Definition of Cloud Computing; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2011.
  2. Muhammad, N.; Bibi, N.; Qasim, I.; Jahangir, A.; Mahmood, Z. Digital watermarking using Hall property image decomposition method. Pattern Anal. Appl. 2018, 21, 997–1012. [Google Scholar] [CrossRef]
  3. Wang, Y.; Doherty, J.F.; van Dyck, R.E. A watermarking algorithm for fingerprinting intelligence images. In Proceedings of the Conference on Information Sciences and Systems, Baltimore, MD, USA, 21–23 March 2001. [Google Scholar]
  4. Kim, J.; Oh, K.; Oh, B.S.; Lin, Z.; Toh, K.A. A line feature extraction method for finger-knuckle-print verification. Cognitive Computation 2019, 11, 50–70. [Google Scholar] [CrossRef]
  5. Nagra, J.; Thomborson, C.; Collberg, C. A functional taxonomy for software watermarking. In Australian Computer Science Communications; Australian Computer Society, Inc.: Sydney, NSW, Australia, 2002. [Google Scholar]
  6. Storozhenko, A. An Approach for Software Protection in Cloud Computing Environment Based on Watermarking Technique. In Proceedings of the Computer Science & Engineering 2013 (CSE-2013), Lviv, Ukraine, 21–23 November 2013; 2013. [Google Scholar]
  7. Sonnleitner, R.G. Widmer, Robust quad-based audio fingerprinting. IEEE/ACM Trans. Audio Speech Lang. Process. 2016, 24, 409–421. [Google Scholar] [CrossRef]
  8. Kamran, M.; Suhail, S.; Farooq, M. A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints. IEEE Trans. Knowl. Data Eng. 2013, 25, 2694–2707. [Google Scholar] [CrossRef]
  9. Wen, Q.; Wang, Y.; Li, P. Two Zero-Watermark methods for XML documents. J. Real-Time Image Process. 2018, 14, 183–192. [Google Scholar] [CrossRef]
  10. Haitsma, J.; Kalker, T. A highly robust audio fingerprinting system. Ismir 2002, 2002, 107–115. [Google Scholar]
  11. Ramalingam, A.; Krishnan, S. Gaussian mixture modeling of short-time Fourier transform features for audio fingerprinting. IEEE Trans. Inf. Forensics Secur. 2006, 1, 457–463. [Google Scholar] [CrossRef]
  12. Neogi, R. Fingerprinting Digital Video for Rights Management in Networks. Google Patents. U.S. Patent 7,336,841, 26 February 2008. [Google Scholar]
  13. Ma, H.; Ma, H.; Li, R.; Yu, X.; Jia, C.; Gao, D. Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2322–2337. [Google Scholar] [CrossRef]
  14. Luo, Y.; Wang, B.; Wang, X.; Zhang, B. SoftMF: A Software Defined Moving Fingerprinting Framework for Proactive Security Policies Enforcement. DEStech Trans. Eng. Technol. Res. 2016. [Google Scholar] [CrossRef] [Green Version]
  15. Constantin, C.; Gross-Amblard, D.; Guerrouani, M. Watermill: An optimized fingerprinting system for highly constrained data. In Proceedings of the 7th Workshop on Multimedia and Security, New York, NY, USA, 1–2 August 2005; pp. 143–155. [Google Scholar]
  16. Liu, S.; Wang, S.; Deng, R.H.; Shao, W.A. A block oriented fingerprinting scheme in relational database. In International Conference on Information Security and Cryptology; Springer: Berlin/Heidelberg, Germany, 2004. [Google Scholar]
  17. Li, Y.; Swarup, V.; Jajodia, S. Fingerprinting relational databases: Schemes and specialties. IEEE Trans. Dependable Secur. Comput. 2005, 2, 34–45. [Google Scholar]
  18. Al-Haj, A.; Odeh, A.; Masadeh, S. Copyright protection of relational database systems. Netw. Digit. Technol. 2010, 143–150. [Google Scholar]
  19. Guo, F.; Wang, J.; Li, D. Fingerprinting relational databases. In Proceedings of the 2006 ACM Symposium on Applied Computing, New York, NY, USA, 23–27 April 2006; 2006. [Google Scholar]
  20. Faundez-Zanuy, M.; Fierrez, J.; Ferrer, M.A.; Diaz, M.; Tolosana, R.; Plamondon, R. Handwriting biometrics: Applications and future trends in e-security and e-health. Cognitive Computation 2020, 12, 940–953. [Google Scholar] [CrossRef]
  21. Nuida, K. Short collusion-secure fingerprint codes against three pirates. Int. J. Inf. Secur. 2012, 11, 85–102. [Google Scholar] [CrossRef]
  22. Agrawal, R.; Kiernan, J. Watermarking relational databases. In Proceedings of the 28th International Conference on Very Large Data Bases, Hong Kong, China, 20–23 August 2002. [Google Scholar]
  23. Luo, Y.; Yang, K.; Tang, Q.; Zhang, J.; Li, P.; Qiu, S. An optimal data service providing framework in cloud radio access network. EURASIP J. Wirel. Commun. Netw. 2016, 2016, 23. [Google Scholar] [CrossRef] [Green Version]
  24. Kaur, K.; Sharma, S.; Kahlon, K.S. A Middleware for Polyglot Persistence and Data Portability of Big Data PaaS Cloud Applications. CMC-Comput. Mater. Contin. 2020, 65, 1625–1647. [Google Scholar] [CrossRef]
  25. Chen, J.; Li, K.; Tang, Z.; Bilal, K.; Yu, S.; Weng, C.; Li, K. A parallel random forest algorithm for big data in a spark cloud computing environment. IEEE Trans. Parallel Distrib. Syst. 2016, 28, 919–933. [Google Scholar] [CrossRef] [Green Version]
  26. Pandey, V.; Saini, P. Application layer scheduling in cloud: Fundamentals, review and research directions. Comput. Syst. Sci. Eng. 2019, 34, 357–376. [Google Scholar] [CrossRef]
  27. Balakrishnan, S.; Surendran, D. Secure Information Access Strategy for a Virtual Data Centre. Comput. Syst. Sci. Eng. 2020, 35, 357–366. [Google Scholar] [CrossRef]
  28. Kim, D.-Y.; Min, S.D.; Kim, S. A DPN (Delegated Proof of Node) mechanism for secure data transmission in IoT services. CMC Comput. Mater. Contin. 2019, 60, 1–14. [Google Scholar] [CrossRef]
  29. Wang, J.; Chen, W.; Wang, L.; Sherratt, R.S.; Alfarraj, O.; Tolba, A. Data secure storage mechanism of sensor networks based on blockchain. CMC-Comput. Mater. Contin. 2020, 65, 2365–2384. [Google Scholar] [CrossRef]
  30. Sivakumar, N.R.; Ghorashi, S.; Jamjoom, M.; Alduailij, M. Heuristic Bent Key Exchange Secured Energy Efficient Data Transaction for Traffic Offloading in Mobile Cloud. CMC-Comput. Mater. Contin 2020, 65, 1925–1943. [Google Scholar] [CrossRef]
  31. Paar, C.; Pelzl, J. Message Authentication Codes (MACs). In Understanding Cryptography: A Textbook for Students and Practitioners; Springer: Berlin/Heidelberg, Germany, 2010; pp. 319–330. [Google Scholar]
  32. Boneh, D.; Shaw, J. Collusion-secure fingerprinting for digital data. In Annual International Cryptology Conference; Springer: Berlin/Heidelberg, Germany, 1995. [Google Scholar]
  33. Guth, H.-J.; Pfitzmann, B. Error-and Collusion-Secure Fingerprinting for Digital Data; Springer: Berlin/Heidelberg, Germany, 1999. [Google Scholar]
  34. Tardos, G. Optimal probabilistic fingerprint codes. J. ACM 2008, 55, 10. [Google Scholar] [CrossRef]
  35. Liang, X.; Xiang, S. Robust reversible audio watermarking based on high-order difference statistics. Signal Process. 2020, 173, 107584. [Google Scholar] [CrossRef]
  36. Wang, W.; Wang, W. New High Capacity Reversible Data Hiding Using the Second-Order Difference Shifting. IEEE Access 2020, 8, 85367–85379. [Google Scholar] [CrossRef]
  37. Iqbal, S.; Laiha, M.K.; Babak, D.; Hussain, M.; Suleman, K.; Khan, M.K.; Choo, K.-K.R. On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. J. Netw. Comput. Appl. 2016, 74, 98–120. [Google Scholar] [CrossRef]
  38. Lafaye, J. An analysis of database watermarking security. In Information Assurance and Security, Proceedings of the Third International Symposium on Information Assurance and Security, Manchester, UK, 29–31 August 2007. [Google Scholar]
  39. Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.H.; Konwinski, A.; Lee, G.; Patterson, D.A.; Rabkin, A.; Stoica, I.; et al. Above the Clouds: A Berkeley View of Cloud Computing; Technical Report UCB/EECS-2009-28; EECS Department, University of California: Berkeley, CA, USA, 2009. [Google Scholar]
  40. Sun, Y.; Zhang, J.; Xiong, Y.; Zhu, G. Data security and privacy in cloud computing. Int. J. Distrib. Sens. Netw. 2014, 10, 190903. [Google Scholar] [CrossRef] [Green Version]
  41. Zhou, M.; Zhou, M.; Wang, J.; Wang, C.; Li, D. A novel fingerprinting architecture for relational data. In Proceedings of the 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, Cairns, QLD, Australia, 21–23 February 2007. [Google Scholar]
  42. Available online: https://azure.microsoft.com/ (accessed on 21 May 2021).
  43. Available online: https://www.infochimps.com/ (accessed on 21 May 2021).
  44. Available online: https://www.amazon.com/ (accessed on 21 May 2021).
  45. Available online: https://www.oracle.com/cloud/daas.html (accessed on 21 May 2021).
  46. McDermott, J.; Forsyth, R.S. Diagnosing a disorder in a classification benchmark. Pattern Recognit. Lett. 2016, 73, 41–43. [Google Scholar] [CrossRef]

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (1)

Figure 1. An overview of the proposed security model.

Figure 1. An overview of the proposed security model.

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (2)

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (3)

Figure 2. The sequential workflow of the approach.

Figure 2. The sequential workflow of the approach.

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (4)

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (5)

Figure 3. The security model.

Figure 3. The security model.

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (6)

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (7)

Figure 4. Framework for fingerprint bit generation.

Figure 4. Framework for fingerprint bit generation.

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (8)

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (9)

Figure 5. Aspect system architecture.

Figure 5. Aspect system architecture.

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (10)

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (11)

Figure 6. Decoding accuracy versus deletion of tuples.

Figure 6. Decoding accuracy versus deletion of tuples.

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (12)

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (13)

Figure 7. Decoding accuracy vs. tuples modification.

Figure 7. Decoding accuracy vs. tuples modification.

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (14)

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (15)

Figure 8. Decoding accuracy vs. tuples insertion.

Figure 8. Decoding accuracy vs. tuples insertion.

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (16)

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (17)

Figure 9. Modification deletion attack.

Figure 9. Modification deletion attack.

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (18)

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (19)

Figure 10. Modification attack.

Figure 10. Modification attack.

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (20)

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (21)

Figure 11. Modification insertion attack.

Figure 11. Modification insertion attack.

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (22)

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (23)

Table 1. Parameters and notation.

Table 1. Parameters and notation.

SymbolDescription
R Δ Relational Database
F Δ Fingerprinted Data
ϑ The primary Key value for tuple r
r A i The numeric attributes A i of tuple r, where i = 0 to n 1
r Tuples
F The fingerprint, represent as a string of length l
F ˜ Decoded Fingerprint
r ^ The fraction of tuples that are selected for fingerprinting
H Hash function
H ˜ Cryptographic hash function Message Digest (MD5)
k S Secret key
λ Number of Buyers
L Length of fingerprint
Δ i Subset
β Buyer ID
ηNumber of partitions
ξ Least significant bit (LSB)
Γ Threshold
J A Login account
Similar constraints
ψ Different constraints
τ Login time (UTC)
A IP and MAC address
μ Mean (Avg)
σ Standard deviation
m Number of partitions
m M = 0 or m = 1
K K bit
𝓅 Partition
D ˜ Slash Dataset

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (24)

Table 2. Variations in parameters for fingerprint generation.

Table 2. Variations in parameters for fingerprint generation.

Parameter12345678
Buyer IDDSDDSSDD
IP AddressSSDDDDSS
MAC AddressSSDDDDSS
UTCDDSDSDSS
Login IDSSSSDDSD

D = Different, S = Same.

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.


© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (2024)
Top Articles
401(k): What It Is, How It Works, Pros, and Cons
401(k)s vs. pension plans
Creepshotorg
Top 11 Best Bloxburg House Ideas in Roblox - NeuralGamer
Jordanbush Only Fans
Bleak Faith: Forsaken – im Test (PS5)
Skylar Vox Bra Size
Pnct Terminal Camera
Erika Kullberg Wikipedia
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Free Atm For Emerald Card Near Me
Kris Carolla Obituary
Nwi Police Blotter
Southland Goldendoodles
Qhc Learning
Helloid Worthington Login
Facebook Marketplace Charlottesville
The fabulous trio of the Miller sisters
Cbs Trade Value Chart Fantasy Football
Maplestar Kemono
Youravon Comcom
Define Percosivism
Who called you from +19192464227 (9192464227): 5 reviews
Lehmann's Power Equipment
Craigslist West Valley
Pearson Correlation Coefficient
Hdmovie2 Sbs
Vivaciousveteran
6892697335
Cardaras Funeral Homes
Ticket To Paradise Showtimes Near Cinemark Mall Del Norte
Pioneer Library Overdrive
Bridgestone Tire Dealer Near Me
Kamzz Llc
Angel del Villar Net Worth | Wife
Graphic Look Inside Jeffrey Dresser
Solve 100000div3= | Microsoft Math Solver
Worlds Hardest Game Tyrone
2015 Chevrolet Silverado 1500 for sale - Houston, TX - craigslist
2016 Honda Accord Belt Diagram
20 Best Things to Do in Thousand Oaks, CA - Travel Lens
159R Bus Schedule Pdf
The Wait Odotus 2021 Watch Online Free
Satucket Lectionary
Grand Valley State University Library Hours
Rocket Lab hiring Integration &amp; Test Engineer I/II in Long Beach, CA | LinkedIn
Ehc Workspace Login
Killer Intelligence Center Download
Workday Latech Edu
What Does the Death Card Mean in Tarot?
Call2Recycle Sites At The Home Depot
Scholar Dollar Nmsu
Latest Posts
Article information

Author: Pres. Lawanda Wiegand

Last Updated:

Views: 5687

Rating: 4 / 5 (71 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Pres. Lawanda Wiegand

Birthday: 1993-01-10

Address: Suite 391 6963 Ullrich Shore, Bellefort, WI 01350-7893

Phone: +6806610432415

Job: Dynamic Manufacturing Assistant

Hobby: amateur radio, Taekwondo, Wood carving, Parkour, Skateboarding, Running, Rafting

Introduction: My name is Pres. Lawanda Wiegand, I am a inquisitive, helpful, glamorous, cheerful, open, clever, innocent person who loves writing and wants to share my knowledge and understanding with you.