Abstract
Distributed database security has become an important issue. In this paper, a new computational method for protecting the distributed databases is presented. Such approach is applied for protecting both textual and numerical data. This is done by adding only one hidden record with a secret function. For each attribute, the value of this function depends on the data stored in all other records. Therefore, this technique is more powerful against any attacks or modifications such as deleting or updating cell values. Furthermore, the problems associated with the work in literature are solved. For example, there is no need for additional storage area as required when adding additional columns especially with large databases. In addition, in case of protecting data by adding columns, we need to add a number of columns equal to the number of data types to be protected. Here, only one record is sufficient to protect all types of data. Another advantage is that, there is a possibility to use a different function for each field results in more robustness. Moreover, a real-time intrusion detection algorithm is introduced for fast attack detection. Finally, the proposed technique does not have any other requirements or restrictions on either database design or database administration.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Gross-Amblard, D.: Query-Preserve Watermarking of Relational Databases and XML Documents. In: Proceedings of the 22nd ACM SIGMODSIGACT-SIGART Symposium on Principles of Database Systems PODS 2003, pp. 191–201. ACM Press, New York (2003)
Digital Signatures in Relational Database Applications online available at GRANDKELL systems INC. (2007), http://www.gradkell.com
Cox, I.J.: A review of watermarking and the importance of perceptual modeling. In: Proc. of Electronic Imaging (February 1997)
Cox, I., Bloom, J., Miller, M.: Digital Watermarking. Morgan Kaufinann, San Francisco (2001)
Kiernan, J., Agrawal, R.: Watermarking Relational Databases. In: Proc. 28th International Conference. Very Large Databases VLDB (2002)
Boney, L., Tewfik, A.H., Hamdy, K.N.: Digital watermarks for audio signals. In: International Conference on Multimedia Computing and Systems, Hiroshima, Japan (June 1996)
Atallah, M., Wagstaff, S.: Watermarking with quadratic residues. In: Proc. of IS&T/SPIE Conference on Security and Watermarking of Multimedia Contents (January 1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
El-Bakry, H.M., Hamada, M. (2010). A Developed WaterMark Technique for Distributed Database Security. In: Herrero, Á., Corchado, E., Redondo, C., Alonso, Á. (eds) Computational Intelligence in Security for Information Systems 2010. Advances in Intelligent and Soft Computing, vol 85. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16626-6_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-16626-6_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16625-9
Online ISBN: 978-3-642-16626-6
eBook Packages: EngineeringEngineering (R0)