Abstract
Information on the open medium like Internet is of great source of digital content. This can be copied easily, modified by the unauthorized users and shared among various unknown users of the Internet. This possesses threats in various forms to the owner of the digital information. In this paper we focus on copyright issue and propose a mechanism for proof of ownership based on the secure embedding of a robust imperceptible watermark in the relational database. It is achieved by formulating a watermarking method, which will watermark only the numeric attributes. This introduces a new way of dividing the database into different subsets and a meaningful watermark is embedded into database. Proposed watermarking technique avoids the synchronization problems and is resilient to subset selection attack, alteration attack, attribute cutting attack and subset addition attack.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agrawal, R., Kiernan, J.: Watermarking Relational Databases. In: Proceedings of the 28th VLDB Conference, Hong Kong, China, pp. 155–166 (2002)
Hale, J., Threet, J., Shenoi, S.: A Framework for High Assurance Security of Distributed Objects. In: IFIP TC11/WG11.3 International Conference on Database Security. Status and prospects: status and prospects, vol. X, pp. 100–199 (1997)
Vaas, L.: Putting a stop to database piracy. eWEEK, enterprise news and reviews (2003)
Bertino, E., Braun, M., Castano, S., Ferrari, E., Mesiti, M.: Author-x: A java based System for XML Data Protection. In: Proc. IFIP TC11/WG11.3 14th Annual Working Conference on Database Security: Data and Application Security Development Directions, pp. 15—26 (2000)
Sion, R., Atallah, M., Prabhakar, S.: Rights Protection for Relational Data. Transaction on Knowledge and Data Engineering 16(12), 1509–1525 (2004)
Shehab, M., Bertino, E., Ghafoor, A.: Watermarking Relational Databases Using Optimization-Based Techniques. IEEE Trancatiions on Knowledge and Data Engineering 20(1), 116–129 (2008)
Bertino, E., Jajodia, S., Samarati, P.: A Flexible Authorization Mechanism for Relational Data Management Systems. ACM Trans. Information Systems 17(2), 101–140 (1999)
Hildebrandt, E., Saake, G.: User Authentication in Multidatabase Systems. In: Proc.9th Int‘l. Workshop Database and Expert Systems Applications, pp. 281–286 (1998)
Cox, I., Bloom, J., Miller, M.: Digital Watermarking. Morgan Kaufmann Publishers (2001)
Swanson, M., Kobayashi, M., Tewfik, A.: Multimedia Data Embedding and Watermarking Technologies. Proc. IEEE 86, 1064–1087 (1998)
Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. Proc. IEEE 87(7), 1079–1107 (1999)
Jajodia, S., Samarati, P., Subrahmanian, V.S.: A Logical Language for Expressing Authorizations. In: Proc. IEEE Symp. Security and Privacy, pp. 31–42 (1997)
Jajodia, S., Samarati, P., Subrahmanian, V.S., Bertino, E.: A Unified Framework for Enforcing Multiple Access Control Policies. In: Proc. SIGMOD, pp. 474–485 (1997)
Huang, M., Cao, J., Peng, Z., Fang, Y.: A New watermark Mechanism for Relational Data. In: The Proceedings of the 4th International Conference on Computer and Information Technology, pp. 946–950 (2004)
Li, N., Feigenbaum, J., Grosof, B.N.: A Logic-Based Knowledge Representation for Authorization with Delegation. In: PCSFW: Proc. 12th Computer Security Foundations Workshop, pp. 162–174 (1999)
Nyanchama, M., Osborn, S.L.: Access Rights Administration in Role-Based Security Systems. In: Proc. IFIP Workshop Database Security, vol. 60, pp. 37–56 (1994)
Sion, R., Atallah, M., Prabhakar, S.: Resilient rights protection for sensor streams. In: Proc. of the very large Databases Conference, pp. 732–743 (2004)
Osborn, S.L.: Database Security Integration Using Role-Based Access Control. In: Proc. IFIP Workshop Database Security, vol. 201, pp. 245–258 (2000)
Rasikan, D., Son, S.H., Mukkamala, R.: Supporting Security Requirements in Multilevel Real-Time Databases, pp. 199–210 (1995)
Schneier, B.: Applied Cryptography, 2nd edn. John Wiley (1996)
Gross-Amblard, D.: Query-Preserving watermarking of Relational Databases and XML Documents. In: Proc. 22nd ACM SIGMOD-SIGACT Symp. Principles of Database Systems (PODS 2003), pp. 191–201 (2003)
Li, Y., Swarup, V., Jajodia, S.: Constructing a Virtual Primary Key for Fingerprinting Relational Data. In: Proc. ACM Workshop on Digital Rights Management, pp. 133–141 (2003)
Li, Y., Guo, H., Jajodia, S.: Tamper Detection and Localization for Categorical Data Using Fragile Watermarks. In: Proc. 4th ACM Workshop Digital Rights Management (DRM 2004), pp. 72–82 (2004)
Sion, R.: Proving ownership over categorical data. In: Proc. of IEEE International Conference on Data Engineering, pp. 584–596 (2004)
Bertino, E., Ooi, B.C., Yang, Y., Deng, R.: Privacy and ownership preserving of outsourced medical data. In: Proc. of IEEE International Conference on Data Engineering, pp. 521–532 (2005)
Sion, R., Atallah, M.J., Prabhakar, S.: On Watermarking Numeric Sets. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, pp. 130–146. Springer, Heidelberg (2003)
Guo, F., Wang, J., Li, D.: Fingerprinting Relational Databases. In: Proceedings Symposium on Applied Computing, vol. 2(1), pp. 487–492 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rao, B.V.S., Prasad, M.V.N.K. (2012). Subset Selection Approach for Watermarking Relational Databases. In: Kannan, R., Andres, F. (eds) Data Engineering and Management. ICDEM 2010. Lecture Notes in Computer Science, vol 6411. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27872-3_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-27872-3_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27871-6
Online ISBN: 978-3-642-27872-3
eBook Packages: Computer ScienceComputer Science (R0)