Browse > Article
http://dx.doi.org/10.3837/tiis.2021.09.016

A data corruption detection scheme based on ciphertexts in cloud environment  

Guo, Sixu (China Mobile Communication Research Institute)
He, Shen (China Mobile Communication Research Institute)
Su, Li (China Mobile Communication Research Institute)
Zhang, Xinyue (China Mobile Communication Research Institute)
Geng, Huizheng (China Mobile Communication Research Institute)
Sun, Yang (China Mobile Communication Research Institute)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.15, no.9, 2021 , pp. 3384-3400 More about this Journal
Abstract
With the advent of the data era, people pay much more attention to data corruption. Aiming at the problem that the majority of existing schemes do not support corruption detection of ciphertext data stored in cloud environment, this paper proposes a data corruption detection scheme based on ciphertexts in cloud environment (DCDC). The scheme is based on the anomaly detection method of Gaussian model. Combined with related statistics knowledge and cryptography knowledge, the encrypted detection index for data corruption and corruption detection threshold for each type of data are constructed in the scheme according to the data labels; moreover, the detection token for data corruption is generated for the data to be detected according to the data labels, and the corruption detection of ciphertext data in cloud storage is realized through corresponding tokens. Security analysis shows that the algorithms in the scheme are semantically secure. Efficiency analysis and simulation results reveal that the scheme shows low computational cost and good application prospect.
Keywords
Data corruption; Ciphertexts; Cloud environment; Cryptography; Corruption detection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Birra T, Li T, Daniel B et al., "Detection of Isocitrate Dehydrogenase Mutated Glioblastomas Through Anomaly Detection Analytics: A Pilot Study," Neurosurgery, vol. 89, no, 2, pp, 323-328, Apr, 2021.   DOI
2 Meng L, Zhang J, "Process Design of Laser Powder Bed Fusion of Stainless Steel Using a Gaussian Process-Based Machine Learning Model," JOM, vol. 72, no. 1, pp. 420-428, Mar, 2020.   DOI
3 Velupillai S, Dalianis H, Hassel M et al., "Developing a standard for de-identifying electronic patient records written in Swedish: Precision, recall and F-measure in a manual and computerized annotation trial," International Journal of Medical Informatics, vol. 78, no. 12, pp. e19-e26, Dec, 2009.   DOI
4 Biswas S, Babu RV, "Real time anomaly detection in H. 264 compressed videos," in Proc. of the fourth National Conference on Computer Vision, Pattern Recognition., Image Processing and Graphics, pp. 1-4, Dec, 2013.
5 A Ouafa Amira, "Weighted-capsule routing via a fuzzy gaussian model - ScienceDirect," Pattern Recognition Letters, vol. 138, no. 1, pp. 424-430, Aug, 2020.   DOI
6 Lu Q, Yao X, "Clustering and learning Gaussian distribution for continuous optimization," IEEE Transactions on Systems Man & Cybernetics Part C Applications & Reviews, vol. 35, no. 2, pp. 195-204, May, 2000.
7 D. Chen, S. L. Sain, and K. Guo, "Data mining for the online retail industry: a case study of RFM model-based customer segmentation using data mining," Journal of Database Marketing & Customer Strategy Management, vol. 19, no. 3, pp. 197-208, 2012.   DOI
8 J. Wang, Z. Xu, "Spatio-temporal texture modeling for real-time crowd anomaly detection," Comput.Vis. Image Underst., vol. 144, pp. 177-187, Mar, 2009.
9 Mahadevan V, Li W X, Bhalodia V et al., "Anomaly detection in crowded scenes," Computer Vision & Pattern Recognition, IEEE, pp. 13-18, Jun, 2010.
10 Chandola V, Banerjee A, Kumar V, "Anomaly Detection for Discrete Sequences: A Survey," IEEE Transactions on Knowledge & Data Engineering, vol. 24, no.5, pp. 823-839, 2012.   DOI
11 Daniel Barbara, Goel R, Jajodia S, "Using Checksums to Detect Data Corruption," Lecture Notes in Computer Science, vol. 1777, no. 1, pp. 136-149, Mar, 2000.
12 Chen C L P, Zhang C Y, "Data-intensive applications, challenges, techniques and technologies: A survey on big data," Information Sciences, vol. 275, no. 8, pp. 314-347, Aug, 2014.   DOI
13 A. Amin, F. Al-Obeidat, B. Shah, A. Adnan, J. Loo, and S. Anwar, "Customer churn prediction in telecommunication industry using data certainty," Journal of Business Research, vol. 94, pp. 290-301, Jun, 2019.   DOI
14 Tahir S, Rajarajan M, "Privacy-Preserving Searchable Encryption Framework for Permissioned Blockchain Networks," in Proc. of 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1628-1633, Jun, 2019.
15 Park E, Jeong J, Han W S et al., "Estimation of Groundwater Level Based on the Robust Training of Recurrent Neural Networks Using Corrupted Data," Journal of Hydrology, vol. 582, no. 1, pp. 124512, Mar, 2020.   DOI
16 J. Liu, Y. Feng, W. Liu, D. Orlando and H. Li, "Training Data Assisted Anomaly Detection of Multi-Pixel Targets In Hyperspectral Imagery," IEEE Transactions on Signal Processing, vol. 68, pp. 3022-3032, Apr, 2020.   DOI
17 Shehab D, Ammar H, "Statistical detection of a panic behavior in crowded scenes," Machine Vision and Applications, vol. 30, no. 5, pp. 919-931, Jul, 2019.   DOI
18 Yue G, Jun ping D, Meiyu, "Abnormal event detection in tourism video based on salient spatio-temporal features and sparse combination learning," World Wide Web, vol. 22, no. 2, pp. 689-715, Mar, 2019.   DOI
19 Pan, X., S. Tang, and Z. Zhu, "Privacy-Preserving Multilayer In-Band Network Telemetry and Data Analytics," in Proc. of IEEE/CIC International Conference on Communications in China (ICCC) 2020 IEEE, Jul, 2020.
20 Nick Iliev, Alberto Gianelli, Amit Ranjan Trivedi, "Low Power Speaker Identification by Integrated Clustering and Gaussian Mixture Model Scoring," Embedded Systems Letters IEEE., vol. 12, no. 1, pp. 9-12, May, 2020.   DOI
21 Jun Wu, Li Shi, Wen-Pin Lin, Sang-Bing Tsai, Yuanyuan Li, Liping Yang, Guangshu Xu, "An Empirical Study on Customer Segmentation by Purchase Behaviors Using a RFM Model and K-Means Algorithm," Mathematical Problems in Engineering, vol. 2020, Article ID 8884227, p. 7, Nov, 2020.
22 Y. Zhang, "An adaptive flow counting method for anomaly detection in SDN," in Proc. of the ninth ACM conference on Emerging networking experiments and technologies, pp. 25-30, Dec, 2013.
23 C. Lu, J. Shi, J. Jia, "Abnormal event detection at 150 fps in matlab," in Proc. of the 2013 IEEE International Conference on Computer Vision, pp. 2720-2727, Oct, 2013.
24 M. Bertini, A. Bimbo, L. Seidenari, "Multi-scale and real-time non-parametric approach for anomaly detection and localization," Comput. Vis. Image Underst., vol. 116, no. 3, pp. 320-329, Oct, 2012.   DOI
25 L. Huang, Z. Zhao, K. Xing, "Web data extraction based on edit distance," Journal of Computer Applications, vol. 32, no. 6, pp. 1662 - 1665, 2012.   DOI
26 Moscoso M, Novikov A, Papanicolaou G et al., "Imaging with highly incomplete and corrupted data," Inverse Problems, vol. 36, no. 3, pp. 035010, Feb, 2020.   DOI
27 R. Leyva, V. Sanchez, C. T. Li, "Video anomaly detection with compact feature sets for online performance," IEEETrans. Image Process, vol. 26, no. 7, pp. 3463-3478, Jul, 2017.   DOI
28 Qu J, Du Q, Li Y et al., "Anomaly Detection in Hyperspectral Imagery Based on Gaussian Mixture Model," IEEE Transactions on Geoscience and Remote Sensing, pp.1-14, Dec, 2020.
29 Liang J M, Shen S Q, Li M et al., "Quantum Anomaly Detection with Density Estimation and Multivariate Gaussian Distribution," Physical Review A, vol. 99, no. 5, pp. 52310-52310, 2019.   DOI
30 Cao N, Wang C, Li M et al., "Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222-233, Jan, 2014.   DOI
31 Zarezadeh M, Mala H, Ashouri-Talouki M, "Multi-keyword ranked searchable encryption scheme with access control for cloud storage," Peer-to-Peer Networking and Applications, vol. 13, no. 1, pp. 207-218, Jun, 2020.   DOI