Skip to main content

A Developed WaterMark Technique for Distributed Database Security

  • Conference paper
Computational Intelligence in Security for Information Systems 2010

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 85))

Abstract

Distributed database security has become an important issue. In this paper, a new computational method for protecting the distributed databases is presented. Such approach is applied for protecting both textual and numerical data. This is done by adding only one hidden record with a secret function. For each attribute, the value of this function depends on the data stored in all other records. Therefore, this technique is more powerful against any attacks or modifications such as deleting or updating cell values. Furthermore, the problems associated with the work in literature are solved. For example, there is no need for additional storage area as required when adding additional columns especially with large databases. In addition, in case of protecting data by adding columns, we need to add a number of columns equal to the number of data types to be protected. Here, only one record is sufficient to protect all types of data. Another advantage is that, there is a possibility to use a different function for each field results in more robustness. Moreover, a real-time intrusion detection algorithm is introduced for fast attack detection. Finally, the proposed technique does not have any other requirements or restrictions on either database design or database administration.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gross-Amblard, D.: Query-Preserve Watermarking of Relational Databases and XML Documents. In: Proceedings of the 22nd ACM SIGMODSIGACT-SIGART Symposium on Principles of Database Systems PODS 2003, pp. 191–201. ACM Press, New York (2003)

    Chapter  Google Scholar 

  2. Digital Signatures in Relational Database Applications online available at GRANDKELL systems INC. (2007), http://www.gradkell.com

  3. Cox, I.J.: A review of watermarking and the importance of perceptual modeling. In: Proc. of Electronic Imaging (February 1997)

    Google Scholar 

  4. Cox, I., Bloom, J., Miller, M.: Digital Watermarking. Morgan Kaufinann, San Francisco (2001)

    Google Scholar 

  5. Kiernan, J., Agrawal, R.: Watermarking Relational Databases. In: Proc. 28th International Conference. Very Large Databases VLDB (2002)

    Google Scholar 

  6. Boney, L., Tewfik, A.H., Hamdy, K.N.: Digital watermarks for audio signals. In: International Conference on Multimedia Computing and Systems, Hiroshima, Japan (June 1996)

    Google Scholar 

  7. Atallah, M., Wagstaff, S.: Watermarking with quadratic residues. In: Proc. of IS&T/SPIE Conference on Security and Watermarking of Multimedia Contents (January 1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

El-Bakry, H.M., Hamada, M. (2010). A Developed WaterMark Technique for Distributed Database Security. In: Herrero, Á., Corchado, E., Redondo, C., Alonso, Á. (eds) Computational Intelligence in Security for Information Systems 2010. Advances in Intelligent and Soft Computing, vol 85. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16626-6_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16626-6_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16625-9

  • Online ISBN: 978-3-642-16626-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics