Skip to main content

Subset Selection Approach for Watermarking Relational Databases

  • Conference paper
Data Engineering and Management (ICDEM 2010)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 6411))

Included in the following conference series:

Abstract

Information on the open medium like Internet is of great source of digital content. This can be copied easily, modified by the unauthorized users and shared among various unknown users of the Internet. This possesses threats in various forms to the owner of the digital information. In this paper we focus on copyright issue and propose a mechanism for proof of ownership based on the secure embedding of a robust imperceptible watermark in the relational database. It is achieved by formulating a watermarking method, which will watermark only the numeric attributes. This introduces a new way of dividing the database into different subsets and a meaningful watermark is embedded into database. Proposed watermarking technique avoids the synchronization problems and is resilient to subset selection attack, alteration attack, attribute cutting attack and subset addition attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Kiernan, J.: Watermarking Relational Databases. In: Proceedings of the 28th VLDB Conference, Hong Kong, China, pp. 155–166 (2002)

    Google Scholar 

  2. Hale, J., Threet, J., Shenoi, S.: A Framework for High Assurance Security of Distributed Objects. In: IFIP TC11/WG11.3 International Conference on Database Security. Status and prospects: status and prospects, vol. X, pp. 100–199 (1997)

    Google Scholar 

  3. Vaas, L.: Putting a stop to database piracy. eWEEK, enterprise news and reviews (2003)

    Google Scholar 

  4. Bertino, E., Braun, M., Castano, S., Ferrari, E., Mesiti, M.: Author-x: A java based System for XML Data Protection. In: Proc. IFIP TC11/WG11.3 14th Annual Working Conference on Database Security: Data and Application Security Development Directions, pp. 15—26 (2000)

    Google Scholar 

  5. Sion, R., Atallah, M., Prabhakar, S.: Rights Protection for Relational Data. Transaction on Knowledge and Data Engineering 16(12), 1509–1525 (2004)

    Article  Google Scholar 

  6. Shehab, M., Bertino, E., Ghafoor, A.: Watermarking Relational Databases Using Optimization-Based Techniques. IEEE Trancatiions on Knowledge and Data Engineering 20(1), 116–129 (2008)

    Article  Google Scholar 

  7. Bertino, E., Jajodia, S., Samarati, P.: A Flexible Authorization Mechanism for Relational Data Management Systems. ACM Trans. Information Systems 17(2), 101–140 (1999)

    Article  Google Scholar 

  8. Hildebrandt, E., Saake, G.: User Authentication in Multidatabase Systems. In: Proc.9th Int‘l. Workshop Database and Expert Systems Applications, pp. 281–286 (1998)

    Google Scholar 

  9. Cox, I., Bloom, J., Miller, M.: Digital Watermarking. Morgan Kaufmann Publishers (2001)

    Google Scholar 

  10. Swanson, M., Kobayashi, M., Tewfik, A.: Multimedia Data Embedding and Watermarking Technologies. Proc. IEEE 86, 1064–1087 (1998)

    Article  Google Scholar 

  11. Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. Proc. IEEE 87(7), 1079–1107 (1999)

    Article  Google Scholar 

  12. Jajodia, S., Samarati, P., Subrahmanian, V.S.: A Logical Language for Expressing Authorizations. In: Proc. IEEE Symp. Security and Privacy, pp. 31–42 (1997)

    Google Scholar 

  13. Jajodia, S., Samarati, P., Subrahmanian, V.S., Bertino, E.: A Unified Framework for Enforcing Multiple Access Control Policies. In: Proc. SIGMOD, pp. 474–485 (1997)

    Google Scholar 

  14. Huang, M., Cao, J., Peng, Z., Fang, Y.: A New watermark Mechanism for Relational Data. In: The Proceedings of the 4th International Conference on Computer and Information Technology, pp. 946–950 (2004)

    Google Scholar 

  15. Li, N., Feigenbaum, J., Grosof, B.N.: A Logic-Based Knowledge Representation for Authorization with Delegation. In: PCSFW: Proc. 12th Computer Security Foundations Workshop, pp. 162–174 (1999)

    Google Scholar 

  16. Nyanchama, M., Osborn, S.L.: Access Rights Administration in Role-Based Security Systems. In: Proc. IFIP Workshop Database Security, vol. 60, pp. 37–56 (1994)

    Google Scholar 

  17. Sion, R., Atallah, M., Prabhakar, S.: Resilient rights protection for sensor streams. In: Proc. of the very large Databases Conference, pp. 732–743 (2004)

    Google Scholar 

  18. Osborn, S.L.: Database Security Integration Using Role-Based Access Control. In: Proc. IFIP Workshop Database Security, vol. 201, pp. 245–258 (2000)

    Google Scholar 

  19. Rasikan, D., Son, S.H., Mukkamala, R.: Supporting Security Requirements in Multilevel Real-Time Databases, pp. 199–210 (1995)

    Google Scholar 

  20. Schneier, B.: Applied Cryptography, 2nd edn. John Wiley (1996)

    Google Scholar 

  21. http://kdd.ics.uci.edu/databases/covertype/covertype.html

  22. Gross-Amblard, D.: Query-Preserving watermarking of Relational Databases and XML Documents. In: Proc. 22nd ACM SIGMOD-SIGACT Symp. Principles of Database Systems (PODS 2003), pp. 191–201 (2003)

    Google Scholar 

  23. Li, Y., Swarup, V., Jajodia, S.: Constructing a Virtual Primary Key for Fingerprinting Relational Data. In: Proc. ACM Workshop on Digital Rights Management, pp. 133–141 (2003)

    Google Scholar 

  24. Li, Y., Guo, H., Jajodia, S.: Tamper Detection and Localization for Categorical Data Using Fragile Watermarks. In: Proc. 4th ACM Workshop Digital Rights Management (DRM 2004), pp. 72–82 (2004)

    Google Scholar 

  25. Sion, R.: Proving ownership over categorical data. In: Proc. of IEEE International Conference on Data Engineering, pp. 584–596 (2004)

    Google Scholar 

  26. Bertino, E., Ooi, B.C., Yang, Y., Deng, R.: Privacy and ownership preserving of outsourced medical data. In: Proc. of IEEE International Conference on Data Engineering, pp. 521–532 (2005)

    Google Scholar 

  27. Sion, R., Atallah, M.J., Prabhakar, S.: On Watermarking Numeric Sets. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, pp. 130–146. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  28. Guo, F., Wang, J., Li, D.: Fingerprinting Relational Databases. In: Proceedings Symposium on Applied Computing, vol. 2(1), pp. 487–492 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rao, B.V.S., Prasad, M.V.N.K. (2012). Subset Selection Approach for Watermarking Relational Databases. In: Kannan, R., Andres, F. (eds) Data Engineering and Management. ICDEM 2010. Lecture Notes in Computer Science, vol 6411. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27872-3_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27872-3_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27871-6

  • Online ISBN: 978-3-642-27872-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics