Integrity verification for XML data

被引:0
作者
Baweu, Jules R. Nya [1 ]
Guo, Huiping [1 ]
机构
[1] Calif State Univ Los Angeles, Dept Comp Sci, Los Angeles, CA 90032 USA
来源
WCECS 2007: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE | 2007年
关键词
XML; security; integrity; watermarking;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The success of the Internet has made the communication very easy between parties and XML is one of the most used standard for information representation and exchange. A huge amount of data is crossing the Internet on the daily basis. Since the Internet is an unreliable network, XML data can be easily captured and tampered by unauthorized users. This study is proposing a scheme that uses fragile watermarking to detect and localize any modification made to an XML data. This scheme is distortion free since it doesn't introduce any distortion to the XML data. This scheme uses an algorithm that distributes elements of the XML data into groups in a secure manner according to certain parameters. The watermark is verified without the need to have the initial XML data, and also, the embedding and the verification process in each group are independent. Experimental results and security analysis show that the chance to detect and locate change in the XML data is very high.
引用
收藏
页码:633 / 638
页数:6
相关论文
共 13 条
[1]  
AGRAWAL R, 2002, P 28 C VER LARG DAT
[2]  
Benedens O, 2000, COMPUT GRAPH FORUM, V19, pC199, DOI 10.1111/1467-8659.00412
[3]  
COLLBERG C, 1999, ANN S PRINC PROGR LA
[4]  
GUO H, IN PRESS INFORM SCI
[5]   A fragile watermarking scheme for detecting malicious modifications of database relations [J].
Guo, HP ;
Li, YJ ;
Liu, AY ;
Jajodia, S .
INFORMATION SCIENCES, 2006, 176 (10) :1350-1378
[6]  
HARMANCI O, 2005, P VIS COMM IM PROC C
[7]  
INOUE S, 2002, S CRYPT INF SEC, P301
[8]  
NG W, 2005, 10 INT C DAT SYST AD
[9]  
REY C, 2002, J APPL SIGNAL PROCES, P613
[10]  
SION R, 2001, CERIAS SEC S