用户名: 密码: 验证码:
P2P数据库内容认证方案的设计与实现
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近年来,基于P2P网络的资源共享技术发展迅速,P2P数据库是该领域的一个重要研究方向。P2P数据库内容认证,即判断数据库内容是否被篡改,是成功构建P2P数据库系统的关键之一。通过数据库内容认证,可保证系统中同名数据库关系结构和存储数据的完全一致,在此基础上提供数据库的并行查询,可极大地提高P2P数据库的查询速度。
     由于数据库是结构化数据集合且数据共享粒度较小,内容认证难度较大。特征提取和数字水印技术在图像、文本内容认证上得以成功应用,但对数据库内容认证而言,单纯采用这两种技术中的任何一种都存在着明显的不足。
     基于上述考虑,取特征提取和脆弱型数据库水印两种技术之所长,将数字水印看为数据库的一级特征向量处理,设计出一个结合两种技术的P2P数据库内容认证方案。
     引入了数据库4级特征向量概念。其中前3级特征向量用以反映关系数据库的结构特征和关键字段的整体数据特征,第4级特征向量为数据库首次出现时被嵌入的水印。第4级特征向量充分利用脆弱型数字水印对数据变更的敏感性,通过水印的提取验证数据是否被修改,是对前3级特征向量的有力补充。
     给出了数据库内容认证的解决方案和数据库水印嵌入与提取验证算法。当数据库首次出现在网络中时,对其进行特征提取,将提取出的特征向量保存在中央服务器的特征数据库中;当需要判定数据库内容是否遭到篡改时,只需再次特征提取,与以前存储的特征向量相比较即可作出判断。
     采用SQL Server2000数据库,在.net平台下完成系统的开发,并介绍了实现的关键技术和特征数据库的设计。
In recent years, the technology of resource sharing based on P2P network has been developed quickly, P2P database is an important research direction in this field. Content authentication judging whether database content has been juggled, is one key constructing step of P2P database. Database content authentication insures that the homonymy databases on system have the same relation structure and stored data. So parallel query can be provided, and the query speed of P2P database can be improved much.
     Because database is a structured data set and the data sharing granularity is smaller, content authentication has much difficulty. Character distilling and data watermark, which have successful application on image and text content authentication, have obvious deficiency on database content authentication when using one of them only.
     Based on above consideration, using the technology advantage of character distilling and data watermark, regard data watermark as one level character vector, a new P2P database content authentication scheme is designed.
     The notion of four level character vectors is introduced. The former three character vectors reflects the structure character of database and the whole data character of key attributes, the fourth level character vector is the data watermark embedded into database when the database appears in system for the first time. The fourth level character vector using sensitivity of brittle data watermark sufficiently, which judges whether the database has been juggled through watermark distilling and comparing, is a good complement to the former three character vectors.
     The scheme of database content authentication and algorithms of watermark embedding and distilling are proposed. When a database appears in system for the first time, its distilled character vector is saved into character database in center server. When database content should be authenticated, character vector will be distilled again.
     The prototype system is developed on .NET platform with SQL Server2000 database, in which the key implement technology and design of character database are introduced.
引文
[1] A berer K, Hauswirth M. An overview on peer-to-peer information systems. In: Litwin W, Levy G, eds. Proc. in Informatics(14). Waterloo: Carleton Sicentific, 2002.171-188
    [2] Stoica I, Morris R, Karger D, etal. Chord: A scalable Peer-to-Peer lookup service for Internet applications. Proceedings of ACM SIGCOMM’01. San Diego, CA, USA, 2001
    [3] Gribble SD, Halevy AY, Ives ZG, Rodrig M, Suciu D. What can databases do for peer-to-peer? In: Mecca G, Simeon J, eds. Proc. (informal)of the 4th Int’l Workshop on the Web and Databases(WebDB). Santa Barbara, 2001.31-36
    [4] Tatarinov I, Halevy A. Efficient query reformulation in peer data management systems. In: Weikum G, Konig AC, Debloch S, eds. Proc.of the ACM SIGMOD Int’l Conf. on the Management of Data. Paris: ACM, 2004.539-550
    [5] Kemenentsietidis A, Arenas M. Data sharing through query translation in autonomous sources. In: Nascimento MA, Ozsu MT, Kossmann D, Miller RJ, Blakeley JA, Schiefer KB, eds. Proc. of the 30th Int’l Conf. on Very Large Data Bases. San Fransisco, Morgan Kaumann Publishers, 2004.468-479
    [6] Daswani N, Garcia-Molina H, Yang B. Open problems in data-sharing peer-to-peer systems. Lecture Notes in Computer Science, 2003, 2572:1-15
    [7]沃焱,韩国强,张波.一种新的基于特征的图像内容认证方法.计算机学报, 2005, 1(28):105-112
    [8] Maze Home Page. URL: http://maze.pku.edu.cn/
    [9] Ooi BC, Shu YF, Tan KL. Relational data sharing in peer-based data management systems. ACM SIGMOD Record, 2003, 32(3):59-64
    [10]鲍宇,刘广钟.基于P2P的分布式数据库模型研究.计算机工程与设计, 2005, 26(2):504-506
    [11] Gnutella Home Page. URL: http://www.gnutella.com/
    [12] Halevy A, Ives Z, Suciu D, Tatarinov I. Schema mediation in a peer data management system. ICDE, 2003.102-117
    [13] Kementsietsidis A, Arenas M, Miller R. Data mapping in peer-to-peer systems. ICDE,2003.271-285
    [14] Ng WS, Ooi BC, Tan KL, Zhou AY. PeerDB: A P2P-based system for distributed data sharing. In: Dayal U, ed. Proc. of the 19th Int’l Conf. on Data Engineering (ICDE). Bangalore: IEEE Computer Society Press, 2003.633-644
    [15] Bernstein P, Giunchiglia F, Kementsietsidis A, L.Serafini, Zaihrayeu I. Data management for peer-to-peer computing: A vision WebDB, 2002.25-39
    [16] Fausto Giunchiglia, Ilya Zaihrayeu. Implementing Database Coordination in P2P Networks. The proceeding of the 2nd Workshop on Semantics in Peer-to-Peer and Grid Computing(SemPGrid’04), 2004.258-270
    [17]李薇.基于Peer-to-Peer的分布式数据库系统的研究.湘潭大学自然科学学报, 2004, 26(4):48-50
    [18]杨健,杨静宇,王正群,郭丽.一种组合特征抽取的新方法.计算机学报, 2002, 6(25)570-575
    [19]吴金海,林福宗.基于数字水印的图像认证技术.计算机学报, 2004, 27(9):1153-1157
    [20] Wong P, Memon N. A Scalable Method for Feature Extraction from Complex Objects. In: Proc. 2nd Intl. Conf. on Data Warehousing and Knowledge discovery, 200.358-371
    [21]肖海青,刘高菘,尹美林.一种新的基于CRC的文本内容认证方法.哈尔滨工业大学学报(自然科学版), 2006, 4(22):84-87
    [22]张宇,刘挺,陈毅恒等.自然语言文本水印[J].中文信息学报, 2005, 19(1):56-59
    [23] Yingjiu Li, Huiping Guo, Sushil Jajodia. Tamper Detection and Localization for Categorical Data Using Fragile Watermarks.Proceeding of the DRM’04, Washington, DC, USA, 2004
    [24]肖湘蓉,孙星明.基于水印的数据库安全控制研究.计算机工程与应用, 2005, 4(6):175-177
    [25]林晓立,陈恩红,任皖英.基于启发式参考集选取的复杂数据特征提取算法.计算机工程, 2003, 11(19):68-70
    [26]李锁花,孙志挥,周晓云.基于特征向量的分布式聚类算法.计算机应用, 2006, 26(2):378-383
    [27] G Voyatzis, I Pitas. The use of watermarks in the protection of digital multimedia products. Proceedings of the IEEE, 1997, 87(7):1197-1207
    [28] Christine I, Podilchuk, Edward J Delp. Digital watermarking: Algorithms and applications. Signal Processing Magazine, 2001, 14(4):33-46
    [29] Ingemar J Cox, J P Linnatrtz. Some general methods for tampering with watrmarks. IEEE Journal on Selected Areas in Communication, 1998, 16(4):587-593
    [30] W Bender, D Gruhl, N Morimoto. Techniques for data hiding. IBM System Journal, 1996, 35(3&4):313-336
    [31] R B Wolfgang, E J Delp. A watermark for still images. IEEE Int’1 Conf. Image Processing, Lausanne, Switzerland, 1996
    [32] A Z Tirkel, C F Osborne, T E Hall. Image and watermark registration. Signal Processing, 1998, 66(3):373-383
    [33] Christine I, Podilchuk, Edward J Delp. Digital watermarking: Algorithms and applications. Signal Processing Magazine, 2001, 14(4):33-46
    [34] Ingemar J Cox, J P Linnatrtz. Some general methods for tampering with watrmarks. IEEE Journal on Selected Areas in Communication, 1998, 16(4):587-593
    [35] Lakshmanan L V S, Leung C S, Ng R T. A New images watermark. IEEE Int’1 Conf. Image Processing, Lausanne, Switzerland, 1996
    [36] R Agrawal, P J Hass, J Kiernan. Watermarking Relational Database. The 28th Intl Conference on Very Large Databases, Hong Kong, 2002-08
    [37] S Radu, A Mikhail, P Sunil. Rights Protection for Relational Data. SIGMOD Conference, 2003:551-562
    [38] R Sion, M Atallah, S Prabhakar. On watermarking numeric sets. Proceedings of IWDW 2002, Lecture Notes in Computer Scinece, CERIASTR, 2001-60, Springer-Verlag, 2002
    [39]李德毅,孟海军,史雪梅.隶属云和隶属云发生器.计算机研究与发展, 1995, 32(6):15-20
    [40]彭沛夫,林亚平,张桂芳,胡斌.基于有效位数的数据库数字水印.计算机工程与应用, 2006, 11(2):166-168
    [41]张桂芳,孙星明,肖湘蓉,彭沛夫.基于中国剩余定理的数据库水印技术.计算机工程与应用, 2006, 7(1):135-137
    [42]王珊,张新宇. Peer-to-Peer数据共享研究.计算机应用与软件, 2003, 11:1-4
    [43] Druschel P, Rowstron A. PAST: A large-scale persistent peer-to-peer storage utility. In: Elphinstone K, ed. Proc. of the HotOS VIII. Schoss Elmau: IEEE Press, 2001.65-70
    [44] Rowstron A, Druschel P. Storage management and caching in PAST: A large-scale persistent peer-to-peer storage utility. In: Chateau Lake Louise, ed. ACM SOSP 2001. Banff: ACM Press, 2001.188-201
    [45] M J Atallah, V Raskin. Natrual language watermarking: Design, analysis, and a proof-of-concept implementation. Lecture Notes in Computer Science, Proc of the 4th International Information Hiding Workshop, Pittsburgh, Pennsylvania, Springer Verlag, 2001-04
    [46] Elisa Bertino, M Braun, Silvana Castano etal. Author-x A java-based System for data protection. IFIP Workshop on Database Security, 2000:15-26
    [47] Brassil J, Low S H, Maxemchuk N F. Electronic marking and identification techniques to discourage document copying. IEEE Journal on Selected Areas in Communications. 1995:13:1495-1504
    [48]王佳,曹加恒,黄敏.一种新的关系数据库水印方法.计算机工程与应用, 2005, 3(3):162-165
    [49]夏启志,谢高岗,闵应骅. IS-P2P:一种基于索引的结构化P2P网络模型.计算机学报, 2006, 4(29):602-610

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700