KEYWORDS: Digital watermarking, Data modeling, Detection and tracking algorithms, Computer security, Data centers, Databases, Information security, Distributed interactive simulations, Data communications, Video
The traceability of data leakage remains a foundational challenge faced by big data. Traditional data tracing technology is mainly based on digital fingerprint to embed lengthy code into digital works such as video, while the structured data with limited embedding space has not been given adequate consideration. In this paper, we propose a chameleon short signature by improving Khalili’s chameleon hash function and combining Boneh’s signature algorithm to achieve a one-to-many signature with a shorter message length under the same security premise. Then, we construct a traitor tracing model based on the proposed signature and design a cascade chain to complete credible data sharing and undeniable leaker detection. Security and simulation analysis show that the traitor tracing model achieves trusted data sharing and efficient traitor tracing for structured data.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.