Int J Performability Eng ›› 2017, Vol. 13 ›› Issue (5): 711-720.doi: 10.23940/ijpe.17.05.p14.711720

• Original articles • Previous Articles     Next Articles

Approach of Tamper Detection for Sensitive Data based on Negotiable Hash Algorithm

Jing Lin*, Chuqiao Mi, and Yuanquan Shi   

  1. School of Computer Science and Engineering, Huaihua University, Huaihua, 418000, Hunan, China

Abstract: Sensitive data is a very important to information safety. The real-world sensitive data is often illegally altered because database administrators (DBAs) have special identity and permissions in database system. However, the traditional secure measures, such as user authentication and access control, do not work well for them. For this case, it is necessary to identify effectively whether the sensitive data in database in enterprise trusted domain is illegally altered or not. Therefore, combining active detection at the security server with passive detection at the security client, a detection approach of the tampered sensitive data based on negotiable hash algorithm is proposed in this paper. Experiments show our algorithm can performs well for sensitive data tamper detection, and it is adapt to protect sensitive data in medical database.


Submitted on March 24, 2017; Revised on June 29, 2017; Accepted on August 21, 2017
References: 23