Skip to main content

Partitioning-Insensitive Watermarking Approach for Distributed Relational Databases

  • Chapter
  • First Online:
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI

Part of the book series: Lecture Notes in Computer Science ((TLDKS,volume 10720))

Abstract

This paper introduces an efficient watermarking approach for distributed relational databases, which is generic enough to support database outsourcing and hybrid partitioning. Various challenges, like partitioning and distribution of data, existence of replication etc., are addressed effectively by watermarking different partitions using different sub keys and by maintaining a meta-data about the data distribution. Notably, the embedding and detection phases are designed with the aim of making embedded watermarks partitioning-insensitive. That means, database partitioning and its distribution do not disturb any embedded watermark at all. To the best of our knowledge, this is the first proposal on watermarking of distributed relational databases supporting database outsourcing, its partitioning and distribution in a distributed setting.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This work is a revised and extended version of [1].

  2. 2.

    University Of California-Irvine KDD Archive: kdd.ics.uci.edu/databases/covertype/ covertype.html.

  3. 3.

    Detail experimental data can be found in [41].

References

  1. Rani, S., Koshley, D.K., Halder, R.: A watermarking framework for outsourced and distributed relational databases. In: Dang, T.K., Wagner, R., Küng, J., Thoai, N., Takizawa, M., Neuhold, E. (eds.) FDSE 2016. LNCS, vol. 10018, pp. 175–188. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-48057-2_12

    Chapter  Google Scholar 

  2. Özsu, M.T., Valduriez, P.: Principles of Distributed Database Systems. Springer, New York (2011)

    Google Scholar 

  3. Amazon Relational Database Service. https://aws.amazon.com/rds/

  4. Microsoft Azure SQL Database. https://azure.microsoft.com/en-in/services/sql-database/

  5. Curino, C., Jones, E.P., Popa, R.A., Malviya, N., Wu, E., Madden, S., Balakrishnan, H., Zeldovich, N.: Relational cloud: A database-as-a-service for the cloud (2011)

    Google Scholar 

  6. Halder, R., Pal, S., Cortesi, A.: Watermarking techniques for relational databases: Survey, classification and comparison. J. UCS 16(21), 3164–3190 (2010)

    Google Scholar 

  7. Bhattacharya, S., Cortesi, A.: A generic distortion free watermarking technique for relational databases. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 252–264. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10772-6_19

    Chapter  Google Scholar 

  8. Rani, S., Kachhap, P., Halder, R.: Data-flow analysis-based approach of database watermarking. In: Chaki, R., Cortesi, A., Saeed, K., Chaki, N. (eds.) Advanced Computing and Systems for Security. AISC, vol. 396, pp. 153–171. Springer, New Delhi (2016). https://doi.org/10.1007/978-81-322-2653-6_11

    Chapter  Google Scholar 

  9. Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking relational data: framework, algorithms and analysis. VLDB J. 12(2), 157–169 (2003)

    Article  Google Scholar 

  10. Gupta, G., Pieprzyk, J.: Database relation watermarking resilient against secondary watermarking attacks. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 222–236. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10772-6_17

    Chapter  Google Scholar 

  11. Zhou, X., Huang, M., Peng, Z.: An additive-attack-proof watermarking mechanism for databases’ copyrights protection using image. In: Proceedings of the 2007 ACM Symposium on Applied Computing, pp. 254–258. ACM (2007)

    Google Scholar 

  12. Halder, R., Cortesi, A.: A persistent public watermarking of relational databases. In: Jha, S., Mathuria, A. (eds.) ICISS 2010. LNCS, vol. 6503, pp. 216–230. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-17714-9_16

    Chapter  Google Scholar 

  13. Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: Proceedings of the 4th ACM workshop on Digital rights management, pp. 73–82. ACM (2004)

    Google Scholar 

  14. Li, Y., Deng, R.H.: Publicly verifiable ownership protection for relational databases. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 78–89. ACM (2006)

    Google Scholar 

  15. Bhattacharya, S., Cortesi, A.: Distortion-free authentication watermarking. In: Cordeiro, J., Virvou, M., Shishkov, B. (eds.) ICSOFT 2010. CCIS, vol. 170, pp. 205–219. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-29578-2_13

    Chapter  Google Scholar 

  16. Zhang, Y., Niu, X., Zhao, D., Li, J., Liu, S.: Relational databases watermark technique based on content characteristic. In: 2006 First International Conference on Innovative Computing, Information and Control, ICICIC 2006, vol. 3, pp. 677–680. IEEE (2006)

    Google Scholar 

  17. Guo, H., Li, Y., Liu, A., Jajodia, S.: A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. 176(10), 1350–1378 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  18. Pournaghshband, V.: A new watermarking approach for relational data. In: Proceedings of the 46th Annual Southeast Regional Conference on XX, pp. 127–131. ACM (2008)

    Google Scholar 

  19. Kamran, M., Suhail, S., Farooq, M.: A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints. IEEE Trans. Knowl. Data Eng. 25(12), 2694–2707 (2013)

    Article  Google Scholar 

  20. Bhattacharya, S., Cortesi, A.: A distortion free watermark framework for relational databases. In: ICSOFT, vol. 2, pp. 229–234 (2009)

    Google Scholar 

  21. Khan, A., Husain, S.A.: A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations. Sci. World J. 2013, 1–16 (2013)

    Google Scholar 

  22. Camara, L., Li, J., Li, R., Xie, W.: Distortion-free watermarking approach for relational database integrity checking. Math. Probl. Eng. 2014, 1–10 (2014)

    Article  Google Scholar 

  23. El-Bakry, H., Hamada, M.: A developed watermark technique for distributed database security. In: Herrero, Á., Corchado, E., Redondo, C., Alonso, Á. (eds.) Computational Intelligence in Security for Information Systems. AISC, vol. 85, pp. 173–180. Springer, Heidelberg (2010)

    Google Scholar 

  24. Razdan, R.: Real-time, distributed, transactional, hybrid watermarking method to provide traceability and copyright protection of digital content in peer-to-peer networks, 7 March 2001. US Patent App. 09/799,509

    Google Scholar 

  25. Mignotte, M.: How to share a secret. In: Beth, T. (ed.) EUROCRYPT 1982. LNCS, vol. 149, pp. 371–375. Springer, Heidelberg (1983). https://doi.org/10.1007/3-540-39466-4_27

    Chapter  Google Scholar 

  26. Khanna, S., Zane, F.: Watermarking maps: hiding information in structured data. In: Proceedings of the Eleventh Annual ACM-SIAM Symposium on Discrete Algorithms, Society for Industrial and Applied Mathematics, pp. 596–605 (2000)

    Google Scholar 

  27. Xie, M.R., Wu, C.C., Shen, J.J., Hwang, M.S.: A survey of data distortion watermarking relational databases. Int. J. Netw. Secur. 18(6), 1022–1033 (2016)

    Google Scholar 

  28. Khanduja, V., Chakraverty, S., Verma, O.P., Singh, N.: A scheme for robust biometric watermarking in web databases for ownership proof with identification. In: Ślȩzak, D., Schaefer, G., Vuong, S.T., Kim, Y.-S. (eds.) AMT 2014. LNCS, vol. 8610, pp. 212–225. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-09912-5_18

    Google Scholar 

  29. Khanduja, V., Verma, O.P., Chakraverty, S.: Watermarking relational databases using bacterial foraging algorithm. Multimed. Tools Appl. 74(3), 813–839 (2015)

    Article  Google Scholar 

  30. Kamel, I., AlaaEddin, M., Yaqub, W., Kamel, K.: Distortion-free fragile watermark for relational databases. Int. J. Big Data Intell. 3(3), 190–201 (2016)

    Article  Google Scholar 

  31. Alfagi, A.S., Manaf, A.A., Hamida, B., Olanrewajub, R.: A zero-distortion fragile watermarking scheme to detect and localize malicious modifications in textual database relations. J. Theoret. Appl. Inf. Technol. 84(3), 404–413 (2016)

    Google Scholar 

  32. Rani, S., Koshley, D.K., Halder, R.: Adapting mapreduce for efficient watermarking of large relational dataset. In: Trustcom/BigDataSE/ICESS, 2017 IEEE, pp. 729–736. IEEE (2017)

    Google Scholar 

  33. Dean, J., Ghemawat, S.: Mapreduce: simplified data processing on large clusters. Commun. ACM 51(1), 107–113 (2008)

    Article  Google Scholar 

  34. De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragments and loose associations: Respecting privacy in data publishing. In: Proceedings of the VLDB Endowment, vol. 3(1–2), pp. 1370–1381 (2010)

    Google Scholar 

  35. Agrawal, S., Narasayya, V., Yang, B.: Integrating vertical and horizontal partitioning into automated physical database design. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, pp. 359–370. ACM (2004)

    Google Scholar 

  36. Huth, M., Ryan, M.: Logic in Computer Science: Modelling and Reasoning about Systems. Cambridge University Press, Cambridge (2004)

    Book  MATH  Google Scholar 

  37. Rodríguez, L., Li, X.: A dynamic vertical partitioning approach for distributed database system. In: 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1853–1858. IEEE (2011)

    Google Scholar 

  38. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  39. Iftene, S.: General secret sharing based on the chinese remainder theorem with applications in e-voting. Electron. Notes Theoret. Comput. Sci. 186, 67–84 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  40. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, New York (2007)

    MATH  Google Scholar 

  41. Rani, S., Kumar Koshley, D., Halder, R.: Partitioning-insensitive watermarking approach for distributed relational databases. Technical report, Department of Computer Science and Engineering, Indian Institute of Technology Patna (2017). http://www.iitp.ac.in/~halder/Papers/TechReport/DistributedRDBWatermark.pdf

Download references

Acknowledgment

This work is partially supported by the Council of Scientific and Industrial Research (CSIR), India. We thank the anonymous reviewers for their useful comments and remarks.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sapana Rani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer-Verlag GmbH Germany

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Rani, S., Koshley, D.K., Halder, R. (2017). Partitioning-Insensitive Watermarking Approach for Distributed Relational Databases. In: Hameurlain, A., Küng, J., Wagner, R., Dang, T., Thoai, N. (eds) Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI. Lecture Notes in Computer Science(), vol 10720. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-56266-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-56266-6_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-56265-9

  • Online ISBN: 978-3-662-56266-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics