{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T01:01:13Z","timestamp":1775091673998,"version":"3.50.1"},"reference-count":49,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T00:00:00Z","timestamp":1683936000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U1836102 and 62002094"],"award-info":[{"award-number":["U1836102 and 62002094"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Anhui Science and Technology Key Special Program","award":["201903a05020016"],"award-info":[{"award-number":["201903a05020016"]}]},{"DOI":"10.13039\/501100003995","name":"Anhui Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["2008085MF196"],"award-info":[{"award-number":["2008085MF196"]}],"id":[{"id":"10.13039\/501100003995","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Anhui Provincial Key Research and Development Program","award":["202104d07020001"],"award-info":[{"award-number":["202104d07020001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Database Syst."],"published-print":{"date-parts":[[2023,6,30]]},"abstract":"<jats:p>In the era of big data, data sharing not only boosts the economy of the world but also brings about problems of privacy disclosure and copyright infringement. The collected data may contain users\u2019 sensitive information; thus, privacy protection should be applied to the data prior to them being shared. Moreover, the shared data may be re-shared to third parties without the consent or awareness of the original data providers. Therefore, there is an urgent need for copyright tracking. There are few works satisfying the requirements of both privacy protection and copyright tracking. The main challenge is how to protect the shared data and realize copyright tracking while not undermining the utility of the data. In this article, we propose a novel solution of a reversible database watermarking scheme based on order-preserving encryption. First, we encrypt the data using order-preserving encryption and adjust an encryption parameter within an appropriate interval to generate a ciphertext with redundant space. Then, we leverage the redundant space to embed robust reversible watermarking. We adopt grouping and K-means to improve the embedding capacity and the robustness of the watermark. Formal theoretical analysis proves that the proposed scheme guarantees correctness and security. Results of extensive experiments show that OPEW has 100% data utility, and the robustness and efficiency of OPEW are better than existing works.<\/jats:p>","DOI":"10.1145\/3589761","type":"journal-article","created":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T12:22:49Z","timestamp":1681734169000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Reversible Database Watermarking Based on Order-preserving Encryption for Data Sharing"],"prefix":"10.1145","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9517-9688","authenticated-orcid":false,"given":"Donghui","family":"Hu","sequence":"first","affiliation":[{"name":"Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology), Ministry of Education; School of Computer Science and Information Engineering, Hefei University of Technology, Hefei, Anhui, China; Anhui Province Key Laboratory of Industry Safety and Emergency Technology; Intelligent Interconnected Systems Laboratory of Anhui Province (Hefei University of Technology), Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5313-1212","authenticated-orcid":false,"given":"Qing","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology), Ministry of Education; School of Computer Science and Information Engineering, Hefei University of Technology, Hefei, Anhui, China; Anhui Province Key Laboratory of Industry Safety and Emergency Technology; Intelligent Interconnected Systems Laboratory of Anhui Province (Hefei University of Technology), Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1007-9735","authenticated-orcid":false,"given":"Song","family":"Yan","sequence":"additional","affiliation":[{"name":"Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology), Ministry of Education; School of Computer Science and Information Engineering, Hefei University of Technology, Hefei, Anhui, China; Anhui Province Key Laboratory of Industry Safety and Emergency Technology; Intelligent Interconnected Systems Laboratory of Anhui Province (Hefei University of Technology), Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7845-168X","authenticated-orcid":false,"given":"Xiaojun","family":"Liu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology), Ministry of Education; School of Computer Science and Information Engineering, Hefei University of Technology, Hefei, Anhui, China; Anhui Province Key Laboratory of Industry Safety and Emergency Technology; Intelligent Interconnected Systems Laboratory of Anhui Province (Hefei University of Technology), Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3553-0813","authenticated-orcid":false,"given":"Meng","family":"Li","sequence":"additional","affiliation":[{"name":"Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology), Ministry of Education; School of Computer Science and Information Engineering, Hefei University of Technology, Hefei, Anhui, China; Anhui Province Key Laboratory of Industry Safety and Emergency Technology; Intelligent Interconnected Systems Laboratory of Anhui Province (Hefei University of Technology), Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0247-909X","authenticated-orcid":false,"given":"Shuli","family":"Zheng","sequence":"additional","affiliation":[{"name":"Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology), Ministry of Education; School of Computer Science and Information Engineering, Hefei University of Technology, Hefei, Anhui, China; Anhui Province Key Laboratory of Industry Safety and Emergency Technology; Intelligent Interconnected Systems Laboratory of Anhui Province (Hefei University of Technology), Hefei, China"}]}],"member":"320","published-online":{"date-parts":[[2023,5,13]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.5555\/1287369.1287384"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.111"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484751"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_33"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_19"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-52993-5_24"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.3390\/app10030984"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2928256"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386023"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/978-3-319-67816-0_15","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"Dyer James","year":"2017","unstructured":"James Dyer, Martin Dyer, and Jie Xu. 2017. Order-preserving encryption using approximate integer common divisors. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, 257\u2013274."},{"issue":"99","key":"e_1_3_2_15_2","doi-asserted-by":"crossref","first-page":"15132","DOI":"10.1109\/ACCESS.2018.2806881","article-title":"A survey on big data market: Pricing, trading and protection","volume":"6","author":"Fan Liang","year":"2018","unstructured":"Liang Fan, Yu Wei, An Dou, Qingyu Yang, Xinwen Fu, and Zhao Wei. 2018. A survey on big data market: Pricing, trading and protection. IEEE Access 6, 99 (2018), 15132\u201315154.","journal-title":"IEEE Access"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA.2010.63"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1080\/02533839.2012.726041"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2294240"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_8"},{"key":"e_1_3_2_20_2","volume-title":"A Fully Homomorphic Encryption Scheme","author":"Gentry Craig","year":"2009","unstructured":"Craig Gentry et\u00a0al. 2009. A Fully Homomorphic Encryption Scheme, Vol. 20. Stanford University, Stanford, CA."},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/1929934.1929937"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/1141277.1141391"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.4108\/e-forensics.2008.2691"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586285"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44670-2_6"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2851517"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-019-00774-x"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530435"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017616"},{"key":"e_1_3_2_30_2","first-page":"1","article-title":"Privacy-preserving navigation supporting similar queries in vehicular networks","author":"Li Meng","year":"2020","unstructured":"Meng Li, Yifei Chen, Shuli Zheng, Donghui Hu, Chhagan Lal, and Mauro Conti. 2020. Privacy-preserving navigation supporting similar queries in vehicular networks. IEEE Trans. Depend. Secure Comput. 99 (2020), 1\u20131.","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"e_1_3_2_31_2","first-page":"1","article-title":"Astraea: Anonymous and secure auditing based on private smart contracts for donation systems","author":"Li Meng","year":"2022","unstructured":"Meng Li, Yifei Chen, Liehaung Zhu, Zijian Zhang, Jianbing Ni, Chhagan Lal, and Mauro Conti. 2022. Astraea: Anonymous and secure auditing based on private smart contracts for donation systems. IEEE Trans. Depend. Secure Comput. (2022), 1\u201317.","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2975175"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3029845"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480070"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00168"},{"key":"e_1_3_2_38_2","first-page":"1019","volume-title":"Proceedings of the 30th USENIX Security Symposium (USENIX Security\u201921)","author":"Shahverdi Aria","year":"2021","unstructured":"Aria Shahverdi, Mahammad Shirinov, and Dana Dachman-Soled. 2021. Database reconstruction from noisy volumes: A cache side-channel attack on SQLite. In Proceedings of the 30th USENIX Security Symposium (USENIX Security\u201921). USENIX Association, 1019\u20131035."},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2004.1329201"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00052"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.94"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_3"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.891046"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2005.44"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2017.0092"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2114651"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2176120"},{"issue":"2","key":"e_1_3_2_50_2","first-page":"59","article-title":"Reversible watermarking for relational database authentication","volume":"17","author":"Zhang Yong","year":"2006","unstructured":"Yong Zhang, Bian Yang, and Xia-Mu Niu. 2006. Reversible watermarking for relational database authentication. J. Comput. 17, 2 (2006), 59\u201366.","journal-title":"J. Comput."}],"container-title":["ACM Transactions on Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589761","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589761","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:22Z","timestamp":1750182562000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589761"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,13]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,6,30]]}},"alternative-id":["10.1145\/3589761"],"URL":"https:\/\/doi.org\/10.1145\/3589761","relation":{},"ISSN":["0362-5915","1557-4644"],"issn-type":[{"value":"0362-5915","type":"print"},{"value":"1557-4644","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,13]]},"assertion":[{"value":"2021-06-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-27","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}