Abstract
Mechanisms for privacy assurances (e.g., queries over encrypted data) are essential to a viable and secure management solution for outsourced data. On a somewhat orthogonal dimension but equally important, we find the requirement to be able to assert and protect rights over such data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Rakesh Agrawal, Peter J. Haas, and Jerry Kiernan. Watermarking relational data: frame-work, algorithms and analysis. The VLDB Journal, 12(2): 157–169, 2003.
Michael Arnold, Stephen D. Wolthusen, and Martin Schmucker. Techniques and Applications of Digital Watermarking and Content Protection. Artech House Publishers, 2003.
Mauro Barni and Franco Bartolini. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Marcel Dekker, 2004.
Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, and Robert H. Deng. Privacy and owner-ship preserving of outsourced medical data. In Proceedings of the International Conference on Data Engineering, pages 521–532, 2005.
D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. Lecture Notes in Computer Science, 963:452–464, 1995.
D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44(5): 1897–1905, 1998.
E.F. Codd. A Relational Model of Data for Large Shared Data Banks. Communications of the ACM, 13(6):377–387, 1970.
I. Cox, J. Bloom, and M. Miller. Digital watermarking. In Digital Watermarking. Morgan Kaufmann, 2001.
Scott Craver, Nasir Memon, Boon-Lock Yeo, and Minerva M. Yeung. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal of Selected Areas in Communications, 16(4):573–586, 1998.
The IBM DB2 Universal Database. Online at http://www.ibm.com/software/data/db2.
Joachim Eggers and Bernd Girod. Informed Watermarking. Kluwer Academic Publishers, 2002.
David Gross-Amblard. Query-preserving watermarking of relational databases and xml documents. In Proceedings of the Nineteenth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pages 191–201, New York, NY, USA, 2003. ACM Press.
H. Guth and B. Pfitzman. Error and collusion secure fingerprinting for digital data. In Proceedings of the Information Hiding Workshop, 1999.
Neil F. Johnson, Zoran Duric, and Sushil Jajodia. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures. Kluwer Academic Publishers, 2001.
S. Katzenbeisser and F. Petitcolas (editors). Information Hiding Techniques for Steganog-raphy and Digital Watermarking. Artech House, 2001.
J. Kiernan and R. Agrawal. Watermarking relational databases. In Proceedings of the 28th International Conference on Very Large Databases VLDB, 2002.
Yingjiu Li, Huiping Guo, and Sushil Jajodia. Tamper detection and localization for categorical data using fragile watermarks. In DRM’04: Proceedings of the 4th ACM workshop on Digital rights management, pages 73–82, New York, NY, USA, 2004. ACM Press.
Yingjiu Li, Vipin Swarup, and Sushil Jajodia. Constructing a virtual primary key for fingerprinting relational data. In DRM’03: Proceedings of the 2003 ACM workshop on Digital rights management, pages 133–141, New York, NY, USA, 2003. ACM Press.
Yingjiu Li, Vipin Swarup, and Sushil Jajodia. A robust watermarking scheme for relational data. In Proceedings of the Workshop on Information Technology and Systems (WITS), pages 195–200, 2003.
Yingjiu Li, Vipin Swarup, and Sushil Jajodia. Defending against additive attacks with maximal errors in watermarking relational databases. In Proceedings of the IFIP WG 11.3 Working Conference on Data and Application Security, pages 81–94, 2004.
Yingjiu Li, Vipin Swarup, and Sushil Jajodia. Fingerprinting relational databases: Schemes and specialties. IEEE Transactions on Dependable and Secure Computing, 2(1):34–45, 2005.
Chun-Shien Lu. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property. Idea Group Publishing, 2004.
Bruce Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C. Wiley & Sons, 1996.
Husrev T. Sencar, Mahalingam Ramkumar, and Ali N. Akansu. Data Hiding Fundamentals And Applications: Content Security in Digital Multimedia. ELSEVIER science and technology books, 2004.
Radu Sion. Proving ownership over categorical data. In Proceedings of the IEEE International Conference on Data Engineering ICDE, 2004.
Radu Sion. Rights Assessment for Discrete Digital Data, Ph.D. dissertation. Computer Sciences, Purdue University, 2004.
Radu Sion. wmdb.*: A suite for database watermarking (demo). In Proceedings of the IEEE International Conference on Data Engineering ICDE, 2004.
Radu Sion and Mikhail Atallah. Attacking digital watermarks. In Proceedings of the Symposium on Electronic Imaging SPIE, 2004.
Radu Sion, Mikhail Atallah, and Sunil Prabhakar. On watermarking numeric sets. Online at https://www.cerias.purdue.edu/tools_and_resources/bibtex_archive/, 2001.
Radu Sion, Mikhail Atallah, and Sunil Prabhakar. On watermarking numeric sets. In Proceedings of IWDW 2002, Lecture Notes in Computer Science. Springer-Verlag, 2002.
Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Power: Metrics for evaluating water-marking algorithms. In Proceedings of IEEE ITCC 2002. IEEE Computer Society Press, 2002.
Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Watermarking databases. Online at https://www.cerias.purdue.edu/tools_and_resources/bibtex_archive/, 2002.
Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Rights protection for relational data. In Proceedings of the ACM Special Interest Group on Management of Data Conference SIGMOD, 2003.
Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Relational data rights protection through watermarking. IEEE Transactions on Knowledge and Data Engineering TKDE, 16(6), June 2004.
Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Resilient rights protection for sensor streams. In Proceedings of the Very Large Databases Conference VLDB, 2004.
Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Ownership proofs for categorical data. IEEE Transactions on Knowledge and Data Engineering TKDE, 2005.
L. G. Valiant. A Theory of the Learnable. In Proceedings of the Symposium on the Theory of Computing, pages 436–445, 1984.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Sion, R. (2007). Rights Assessment for Relational Data. In: Yu, T., Jajodia, S. (eds) Secure Data Management in Decentralized Systems. Advances in Information Security, vol 33. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-27696-0_13
Download citation
DOI: https://doi.org/10.1007/978-0-387-27696-0_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-27694-6
Online ISBN: 978-0-387-27696-0
eBook Packages: Computer ScienceComputer Science (R0)