Abstract
In this paper, we propose a persistent watermarking technique of information systems supported by relational databases at the back-end. The persistency is achieved by identifying an invariant part of the database which remains unchanged w.r.t. the operations in the associated applications. To achieve this, we apply static data-flow analysis technique to the applications. The watermark is then embedded into the invariant part of the database, leading to a persistent watermark. We also watermark the associated applications in the information system by using opaque predicates which are obtained from the variant part of the database.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Observe that we do not follow any specific language syntax.
- 2.
By notation \( {\vec v_d}{|_\phi } \) we denote the part of the database corresponding to the attributes \( {\vec v_d} \) and tuples satisfying the condition \( \phi\).
- 3.
For the sake of simplicity, we omit set-curly-braces incase of singleton set.
- 4.
Available in the University of California-Irvine KDD Archive kdd.ics.uci.edu/databases/covertype/covertype.html.
References
Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking relational data: framework, algorithms and analysis. VLDB J. 12(2), 157–169 (2003)
Al-Haj, A., Odeh, A.: Robust and blind watermarking of relational database systems. J. Comput. Sci. 4, 1024–1029 (2008)
Arboit, G.: A method for watermarking java programs via opaque predicates. In: Proceedings of the 5th International Conference on Electronic Commerce Research (ICECR-5). pp. 184–196. ACM Press, San Diego (2002)
Bhattacharya, S., Cortesi, A.: A distortion free watermark framework for relational databases. In: Proceedings of the 4th International Conference on Software and Data Technologies, Sofia (2009)
Bhattacharya, S., Cortesi, A.: A generic distortion free watermarking technique for relational databases. In: Proceedings of the Fifth International Conference on Information Systems Security (ICISS 2009). LNCS Springer Verlag, Kolkata (2009)
Bhattacharya, S., Cortesi, A.: Distortion-free authentication watermarking. In: Cordeiro, J., Virvou, M., Shishkov, B. (eds.) Software and Data Technologies, pp. 205–219. Springer CCIS, Volume 170 (2013)
Camara, L., Li, J., Li, R., Xie, W.: Distortion-free watermarking approach for relational database integrity checking. Mathematical Problems in Engineering (2014)
Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL’98). pp. 184–196. ACM Press, San Diego (1998)
Dalla Preda, M., Madou, M., De Bosschere, K., Giacobazzi, R.: Opaque predicates detection by abstract interpretation. In: Johnson, M., Vene, V. (eds.) Algebraic Methodology and Software Technology, pp. 8–95. Springer LNCS 4019 (2006)
Guo, H., Li, Y., Liua, A., Jajodia, S.: A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. 176, 1350–1378 (2006)
Gupta, G., Pieprzyk, J.: Database relation watermarking resilient against secondary watermarking attacks. In: Proceedings of the Fifth International Conference on Information Systems Security (ICISS 2009). pp. 222–236. LNCS Springer Verlag, Kolkata (2009)
Halder, R., Cortesi, A.: Persistent watermarking of relational databases. In: Proceedings of the IEEE International Conference on Advances in Communication, Network, and Computing (CNC’10). IEEE CS, India (2010)
Halder, R., Cortesi, A.: A persistent public watermarking of relational databases. In: Proceedings of the 6th International Conference on Information Systems Security (ICISS’10). pp. 216–230. Springer LNCS 6503, India (2010)
Halder, R., Cortesi, A.: Abstract interpretation of database query languages. Comput. Lang. Syst. Struct. 38, 123–157 (2012)
Halder, R., Pal, S., Cortesi, A.: Watermarking techniques for relational databases: survey, classification and comparison. J. Univ. Comput. Sci. 16(21), 3164–3190 (2010)
Hamilton, J., Danicic, S.: A survey of static software watermarking. In: 2011 World Congress on Internet Security (WorldCIS’11). pp. 100–107. IEEE (2011)
Khan, A., Husain, S.A.: A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations. Sci. World J. (2013)
Khanduja, V., Chakraverty, S., Verma, O.P., Singh, N.: A scheme for robust biometric watermarking in web databases for ownership proof with identification. In: Active Media Technology, pp. 212–225. Springer (2014)
Khanduja, V., Verma, O.P., Chakraverty, S.: Watermarking relational databases using bacterial foraging algorithm. Multimed. Tools Appl. pp. 1–27 (2013)
Li, Y., Deng, R.H.: Publicly verifiable ownership protection for relational databases. In: Proceedings of the 2006 ACM Symposium on Information, computer and communications security (ASIACCS’06). pp. 78–89. ACM, Taipei (2006)
Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: Proceedings of the 4th ACM workshop on Digital rights management (DRM’04). pp. 73–82. ACM Press, Washington DC (2004)
Monden, A., Iida, H., Matsumoto, K.i., Inoue, K., Torii, K.: A practical method for watermarking java programs. In: Proceedings of the 24th Annual International Computer Software and Applications Conference, (COMPSAC 2000). pp. 191–197. IEEE (2000)
Myles, G., Collberg, C.: Software watermarking via opaque predicates: implementation, analysis, and attacks 6(2), 155–171 (2006)
Nielson, F., Nielson, H.R., Hankin, C.: Principles of program analysis. Springer, New York (1999)
Sion, R., Atallah, M., Prabhakar, S.: Rights protection for categorical data. IEEE Trans. Knowl. Data Eng. 17, 912–926 (2005)
Yingjiu, L.: Database watermarking: A systematic view. Springer, Berlin (2007)
Zhang, Y., Niu, X., Zhao, D., Li, J., Liu, S.: Relational databases watermark technique based on content characteristic. In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006). IEEE CS, Beijing (2006)
Zhou, X., Huang, M., Peng, Z.: An additive-attack-proof watermarking mechanism for databases’ copyrights protection using image. In: SAC’07: Proceedings of the 2007 ACM Symposium on Applied Computing. pp. 254–258. Seoul, Korea (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this chapter
Cite this chapter
Rani, S., Kachhap, P., Halder, R. (2016). Data-Flow Analysis-Based Approach of Database Watermarking. In: Chaki, R., Cortesi, A., Saeed, K., Chaki, N. (eds) Advanced Computing and Systems for Security. Advances in Intelligent Systems and Computing, vol 396. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2653-6_11
Download citation
DOI: https://doi.org/10.1007/978-81-322-2653-6_11
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2651-2
Online ISBN: 978-81-322-2653-6
eBook Packages: EngineeringEngineering (R0)