Skip to main content

Data-Flow Analysis-Based Approach of Database Watermarking

  • Chapter
  • First Online:
Advanced Computing and Systems for Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 396))

Abstract

In this paper, we propose a persistent watermarking technique of information systems supported by relational databases at the back-end. The persistency is achieved by identifying an invariant part of the database which remains unchanged w.r.t. the operations in the associated applications. To achieve this, we apply static data-flow analysis technique to the applications. The watermark is then embedded into the invariant part of the database, leading to a persistent watermark. We also watermark the associated applications in the information system by using opaque predicates which are obtained from the variant part of the database.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Observe that we do not follow any specific language syntax.

  2. 2.

    By notation \( {\vec v_d}{|_\phi } \) we denote the part of the database corresponding to the attributes \( {\vec v_d} \) and tuples satisfying the condition \( \phi\).

  3. 3.

    For the sake of simplicity, we omit set-curly-braces incase of singleton set.

  4. 4.

    Available in the University of California-Irvine KDD Archive kdd.ics.uci.edu/databases/covertype/covertype.html.

References

  1. Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking relational data: framework, algorithms and analysis. VLDB J. 12(2), 157–169 (2003)

    Article  Google Scholar 

  2. Al-Haj, A., Odeh, A.: Robust and blind watermarking of relational database systems. J. Comput. Sci. 4, 1024–1029 (2008)

    Article  Google Scholar 

  3. Arboit, G.: A method for watermarking java programs via opaque predicates. In: Proceedings of the 5th International Conference on Electronic Commerce Research (ICECR-5). pp. 184–196. ACM Press, San Diego (2002)

    Google Scholar 

  4. Bhattacharya, S., Cortesi, A.: A distortion free watermark framework for relational databases. In: Proceedings of the 4th International Conference on Software and Data Technologies, Sofia (2009)

    Google Scholar 

  5. Bhattacharya, S., Cortesi, A.: A generic distortion free watermarking technique for relational databases. In: Proceedings of the Fifth International Conference on Information Systems Security (ICISS 2009). LNCS Springer Verlag, Kolkata (2009)

    Google Scholar 

  6. Bhattacharya, S., Cortesi, A.: Distortion-free authentication watermarking. In: Cordeiro, J., Virvou, M., Shishkov, B. (eds.) Software and Data Technologies, pp. 205–219. Springer CCIS, Volume 170 (2013)

    Google Scholar 

  7. Camara, L., Li, J., Li, R., Xie, W.: Distortion-free watermarking approach for relational database integrity checking. Mathematical Problems in Engineering (2014)

    Google Scholar 

  8. Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL’98). pp. 184–196. ACM Press, San Diego (1998)

    Google Scholar 

  9. Dalla Preda, M., Madou, M., De Bosschere, K., Giacobazzi, R.: Opaque predicates detection by abstract interpretation. In: Johnson, M., Vene, V. (eds.) Algebraic Methodology and Software Technology, pp. 8–95. Springer LNCS 4019 (2006)

    Google Scholar 

  10. Guo, H., Li, Y., Liua, A., Jajodia, S.: A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. 176, 1350–1378 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  11. Gupta, G., Pieprzyk, J.: Database relation watermarking resilient against secondary watermarking attacks. In: Proceedings of the Fifth International Conference on Information Systems Security (ICISS 2009). pp. 222–236. LNCS Springer Verlag, Kolkata (2009)

    Google Scholar 

  12. Halder, R., Cortesi, A.: Persistent watermarking of relational databases. In: Proceedings of the IEEE International Conference on Advances in Communication, Network, and Computing (CNC’10). IEEE CS, India (2010)

    Google Scholar 

  13. Halder, R., Cortesi, A.: A persistent public watermarking of relational databases. In: Proceedings of the 6th International Conference on Information Systems Security (ICISS’10). pp. 216–230. Springer LNCS 6503, India (2010)

    Google Scholar 

  14. Halder, R., Cortesi, A.: Abstract interpretation of database query languages. Comput. Lang. Syst. Struct. 38, 123–157 (2012)

    MATH  Google Scholar 

  15. Halder, R., Pal, S., Cortesi, A.: Watermarking techniques for relational databases: survey, classification and comparison. J. Univ. Comput. Sci. 16(21), 3164–3190 (2010)

    Google Scholar 

  16. Hamilton, J., Danicic, S.: A survey of static software watermarking. In: 2011 World Congress on Internet Security (WorldCIS’11). pp. 100–107. IEEE (2011)

    Google Scholar 

  17. Khan, A., Husain, S.A.: A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations. Sci. World J. (2013)

    Google Scholar 

  18. Khanduja, V., Chakraverty, S., Verma, O.P., Singh, N.: A scheme for robust biometric watermarking in web databases for ownership proof with identification. In: Active Media Technology, pp. 212–225. Springer (2014)

    Google Scholar 

  19. Khanduja, V., Verma, O.P., Chakraverty, S.: Watermarking relational databases using bacterial foraging algorithm. Multimed. Tools Appl. pp. 1–27 (2013)

    Google Scholar 

  20. Li, Y., Deng, R.H.: Publicly verifiable ownership protection for relational databases. In: Proceedings of the 2006 ACM Symposium on Information, computer and communications security (ASIACCS’06). pp. 78–89. ACM, Taipei (2006)

    Google Scholar 

  21. Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: Proceedings of the 4th ACM workshop on Digital rights management (DRM’04). pp. 73–82. ACM Press, Washington DC (2004)

    Google Scholar 

  22. Monden, A., Iida, H., Matsumoto, K.i., Inoue, K., Torii, K.: A practical method for watermarking java programs. In: Proceedings of the 24th Annual International Computer Software and Applications Conference, (COMPSAC 2000). pp. 191–197. IEEE (2000)

    Google Scholar 

  23. Myles, G., Collberg, C.: Software watermarking via opaque predicates: implementation, analysis, and attacks 6(2), 155–171 (2006)

    Google Scholar 

  24. Nielson, F., Nielson, H.R., Hankin, C.: Principles of program analysis. Springer, New York (1999)

    Google Scholar 

  25. Sion, R., Atallah, M., Prabhakar, S.: Rights protection for categorical data. IEEE Trans. Knowl. Data Eng. 17, 912–926 (2005)

    Article  Google Scholar 

  26. Yingjiu, L.: Database watermarking: A systematic view. Springer, Berlin (2007)

    Google Scholar 

  27. Zhang, Y., Niu, X., Zhao, D., Li, J., Liu, S.: Relational databases watermark technique based on content characteristic. In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006). IEEE CS, Beijing (2006)

    Google Scholar 

  28. Zhou, X., Huang, M., Peng, Z.: An additive-attack-proof watermarking mechanism for databases’ copyrights protection using image. In: SAC’07: Proceedings of the 2007 ACM Symposium on Applied Computing. pp. 254–258. Seoul, Korea (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sapana Rani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this chapter

Cite this chapter

Rani, S., Kachhap, P., Halder, R. (2016). Data-Flow Analysis-Based Approach of Database Watermarking. In: Chaki, R., Cortesi, A., Saeed, K., Chaki, N. (eds) Advanced Computing and Systems for Security. Advances in Intelligent Systems and Computing, vol 396. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2653-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2653-6_11

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2651-2

  • Online ISBN: 978-81-322-2653-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics