Skip to main content

Part of the book series: Advances in Information Security ((ADIS,volume 33))

Abstract

Mechanisms for privacy assurances (e.g., queries over encrypted data) are essential to a viable and secure management solution for outsourced data. On a somewhat orthogonal dimension but equally important, we find the requirement to be able to assert and protect rights over such data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rakesh Agrawal, Peter J. Haas, and Jerry Kiernan. Watermarking relational data: frame-work, algorithms and analysis. The VLDB Journal, 12(2): 157–169, 2003.

    Article  Google Scholar 

  2. Michael Arnold, Stephen D. Wolthusen, and Martin Schmucker. Techniques and Applications of Digital Watermarking and Content Protection. Artech House Publishers, 2003.

    Google Scholar 

  3. Mauro Barni and Franco Bartolini. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Marcel Dekker, 2004.

    Google Scholar 

  4. Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, and Robert H. Deng. Privacy and owner-ship preserving of outsourced medical data. In Proceedings of the International Conference on Data Engineering, pages 521–532, 2005.

    Google Scholar 

  5. D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. Lecture Notes in Computer Science, 963:452–464, 1995.

    Article  Google Scholar 

  6. D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44(5): 1897–1905, 1998.

    Article  MATH  MathSciNet  Google Scholar 

  7. E.F. Codd. A Relational Model of Data for Large Shared Data Banks. Communications of the ACM, 13(6):377–387, 1970.

    Article  MATH  Google Scholar 

  8. I. Cox, J. Bloom, and M. Miller. Digital watermarking. In Digital Watermarking. Morgan Kaufmann, 2001.

    Google Scholar 

  9. Scott Craver, Nasir Memon, Boon-Lock Yeo, and Minerva M. Yeung. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal of Selected Areas in Communications, 16(4):573–586, 1998.

    Article  Google Scholar 

  10. The IBM DB2 Universal Database. Online at http://www.ibm.com/software/data/db2.

    Google Scholar 

  11. Joachim Eggers and Bernd Girod. Informed Watermarking. Kluwer Academic Publishers, 2002.

    Google Scholar 

  12. David Gross-Amblard. Query-preserving watermarking of relational databases and xml documents. In Proceedings of the Nineteenth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pages 191–201, New York, NY, USA, 2003. ACM Press.

    Google Scholar 

  13. H. Guth and B. Pfitzman. Error and collusion secure fingerprinting for digital data. In Proceedings of the Information Hiding Workshop, 1999.

    Google Scholar 

  14. Neil F. Johnson, Zoran Duric, and Sushil Jajodia. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures. Kluwer Academic Publishers, 2001.

    Google Scholar 

  15. S. Katzenbeisser and F. Petitcolas (editors). Information Hiding Techniques for Steganog-raphy and Digital Watermarking. Artech House, 2001.

    Google Scholar 

  16. J. Kiernan and R. Agrawal. Watermarking relational databases. In Proceedings of the 28th International Conference on Very Large Databases VLDB, 2002.

    Google Scholar 

  17. Yingjiu Li, Huiping Guo, and Sushil Jajodia. Tamper detection and localization for categorical data using fragile watermarks. In DRM’04: Proceedings of the 4th ACM workshop on Digital rights management, pages 73–82, New York, NY, USA, 2004. ACM Press.

    Google Scholar 

  18. Yingjiu Li, Vipin Swarup, and Sushil Jajodia. Constructing a virtual primary key for fingerprinting relational data. In DRM’03: Proceedings of the 2003 ACM workshop on Digital rights management, pages 133–141, New York, NY, USA, 2003. ACM Press.

    Google Scholar 

  19. Yingjiu Li, Vipin Swarup, and Sushil Jajodia. A robust watermarking scheme for relational data. In Proceedings of the Workshop on Information Technology and Systems (WITS), pages 195–200, 2003.

    Google Scholar 

  20. Yingjiu Li, Vipin Swarup, and Sushil Jajodia. Defending against additive attacks with maximal errors in watermarking relational databases. In Proceedings of the IFIP WG 11.3 Working Conference on Data and Application Security, pages 81–94, 2004.

    Google Scholar 

  21. Yingjiu Li, Vipin Swarup, and Sushil Jajodia. Fingerprinting relational databases: Schemes and specialties. IEEE Transactions on Dependable and Secure Computing, 2(1):34–45, 2005.

    Article  Google Scholar 

  22. Chun-Shien Lu. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property. Idea Group Publishing, 2004.

    Google Scholar 

  23. Bruce Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C. Wiley & Sons, 1996.

    Google Scholar 

  24. Husrev T. Sencar, Mahalingam Ramkumar, and Ali N. Akansu. Data Hiding Fundamentals And Applications: Content Security in Digital Multimedia. ELSEVIER science and technology books, 2004.

    Google Scholar 

  25. Radu Sion. Proving ownership over categorical data. In Proceedings of the IEEE International Conference on Data Engineering ICDE, 2004.

    Google Scholar 

  26. Radu Sion. Rights Assessment for Discrete Digital Data, Ph.D. dissertation. Computer Sciences, Purdue University, 2004.

    Google Scholar 

  27. Radu Sion. wmdb.*: A suite for database watermarking (demo). In Proceedings of the IEEE International Conference on Data Engineering ICDE, 2004.

    Google Scholar 

  28. Radu Sion and Mikhail Atallah. Attacking digital watermarks. In Proceedings of the Symposium on Electronic Imaging SPIE, 2004.

    Google Scholar 

  29. Radu Sion, Mikhail Atallah, and Sunil Prabhakar. On watermarking numeric sets. Online at https://www.cerias.purdue.edu/tools_and_resources/bibtex_archive/, 2001.

    Google Scholar 

  30. Radu Sion, Mikhail Atallah, and Sunil Prabhakar. On watermarking numeric sets. In Proceedings of IWDW 2002, Lecture Notes in Computer Science. Springer-Verlag, 2002.

    Google Scholar 

  31. Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Power: Metrics for evaluating water-marking algorithms. In Proceedings of IEEE ITCC 2002. IEEE Computer Society Press, 2002.

    Google Scholar 

  32. Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Watermarking databases. Online at https://www.cerias.purdue.edu/tools_and_resources/bibtex_archive/, 2002.

    Google Scholar 

  33. Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Rights protection for relational data. In Proceedings of the ACM Special Interest Group on Management of Data Conference SIGMOD, 2003.

    Google Scholar 

  34. Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Relational data rights protection through watermarking. IEEE Transactions on Knowledge and Data Engineering TKDE, 16(6), June 2004.

    Google Scholar 

  35. Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Resilient rights protection for sensor streams. In Proceedings of the Very Large Databases Conference VLDB, 2004.

    Google Scholar 

  36. Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Ownership proofs for categorical data. IEEE Transactions on Knowledge and Data Engineering TKDE, 2005.

    Google Scholar 

  37. L. G. Valiant. A Theory of the Learnable. In Proceedings of the Symposium on the Theory of Computing, pages 436–445, 1984.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Sion, R. (2007). Rights Assessment for Relational Data. In: Yu, T., Jajodia, S. (eds) Secure Data Management in Decentralized Systems. Advances in Information Security, vol 33. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-27696-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-27696-0_13

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-27694-6

  • Online ISBN: 978-0-387-27696-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics