Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Rights Protection for Relational Data

Published: 01 December 2004 Publication History

Abstract

In this paper, we introduce a solution for relational database content rights protection through watermarking. Rights protection for relational data is of ever-increasing interest, especially considering areas where sensitive, valuable content is to be outsourced. A good example is a data mining application, where data is sold in pieces to parties specialized in mining it. Different avenues are available, each with its own advantages and drawbacks. Enforcement by legal means is usually ineffective in preventing theft of copyrighted works, unless augmented by a digital counterpart, for example, watermarking. While being able to handle higher level semantic constraints, such as classification preservation, our solution also addresses important attacks, such as subset selection and random and linear data changes. We introduce wmdb.*, a proof-of-concept implementation and its application to real-life data, namely, in watermarking the outsourced Wal-Mart sales data that we have available at our institute.

References

[1]
M.J. Atallah and S.S. Wagstaff Jr., “Watermarking with Quadratic Residues,” Proc. IS-T/SPIE Conf. Security and Watermarking of Multimedia Contents, SPIE, vol. 3657, pp. 283-288, 1999.]]
[2]
M.J. Atallah V. Raskin C.F. Hempelmann M. Karahan R. Sion K.E. Triezenberg and U. Topkara, “Natural Language Watermarking and Tamperproofing,” Proc. Fifth Int'l Information Hiding Workshop, 2002.]]
[3]
E. Bertino M. Braun S. Castano E. Ferrari and M. Mesiti, “Author-x: A Java-Based System for XML Data Protection,” Proc. IFIP Workshop Database Security, pp. 15-26, 2000.]]
[4]
E. Bertino S. Jajodia and P. Samarati, “A Flexible Authorization Mechanism for Relational Data Management Systems,” ACM Trans. Information Systems, vol. 17, no. 2, 1999.]]
[5]
C. Collberg and C. Thomborson, “On the Limits of Software Watermarking,” Technical Report #164, Dept. of Computer Science, The Univ. of Auckland, http://citeseer.ist.psu.edu/collberg98limits.html, Aug. 1998. Also available at http://csdl.computer.org/comp/trans/ts/2002/08/e0735abs.htm.]]
[6]
I. Cox J. Bloom and M. Miller, “Digital Watermarking,” Digital Watermarking, Morgan Kaufmann, 2001.]]
[7]
D. Gross-Amblard, “Query-Preserving Watermarking of Relational Databases and XML Documents,” Proc. 19th ACM SIGMOD-SIGACT-SIGART Symp. Principles of Database Systems, 2003.]]
[8]
J. Hale J. Threet and S. Shenoi, “A Framework for High Assurance Security of Distributed Objects,” Database Security, X: Status and Prospects, P. Samarati and R. Sandhu, eds., pp. 99-115, London: Chapman and Hall, 1997.]]
[9]
E. Hildebrandt and G. Saake, “User Authentication in Multidatabase Systems,” Proc. Ninth Int'l Workshop Database and Expert Systems Applications, R.R. Wagner, ed., pp. 281-286, 1998.]]
[10]
S. Jajodia P. Samarati and V.S. Subrahmanian, “A Logical Language for Expressing Authorizations,” Proc. IEEE Symp. Security and Privacy, pp. 31-42, 1997.]]
[11]
S. Jajodia P. Samarati V.S. Subrahmanian and E. Bertino, “A Unified Framework for Enforcing Multiple Access Control Policies,” Proc. SIGMOD, 1997.]]
[12]
Information Hiding Techniques for Steganography and Digital Watermarking, S. Katzenbeisser and F. Petitcolas, eds. Artech House, 2001.]]
[13]
J. Kiernan and R. Agrawal, “Watermarking Relational Databases,” Proc. 28th Int'l Conf. Very Large Databases VLDB, 2002.]]
[14]
N Li J. Feigenbaum and B.N. Grosof, “A Logic-Based Knowledge Representation for Authorization with Delegation,” PCSFW: Proc. 12th Computer Security Foundations Workshop, 1999.]]
[15]
M. Nyanchama and S.L. Osborn, “Access Rights Administration in Role-Based Security Systems,” Proc. IFIP Workshop Database Security, pp. 37-56, 1994.]]
[16]
S.L. Osborn, “Database Security Integration Using Role-Based Access Control,” Proc. IFIP Workshop Database Security, pp. 245-258, 2000.]]
[17]
J. Palsberg S. Krishnaswamy M. Kwon D. Ma Q. Shao and Y. Zhang, “Experience with Software Watermarking,” Proc. ACSAC, 16th Ann. Computer Security Applications Conf., pp. 308-316, 2000.]]
[18]
F.A.P. Petitcolas R.J. Anderson and M.G. Kuhn, “Attacks on Copyright Marking Systems,” Proc. Information Hiding: Second Int'l Workshop, D. Aucsmith, ed., pp. 218-238, 1998.]]
[19]
D. Rasikan S.H. Son and R. Mukkamala, “Supporting Security Requirements in Multilevel Real-Time Databases,” tr-95-21, 1995.]]
[20]
R. Sion M. Atallah and S. Prabhakar, “On Watermarking Numeric Sets,” Proc. Int'l Workshop Digital Watermaking, 2002.]]
[21]
R. Sion M. Atallah and S. Prabhakar, “Power: Metrics for Evaluating Watermarking Algorithms,” Proc. IEEE Int'l Conf. Information Technology: Coding and Computing, 2002.]]

Cited By

View all
  • (2023)Reversible Database Watermarking Based on Order-preserving Encryption for Data SharingACM Transactions on Database Systems10.1145/358976148:2(1-25)Online publication date: 13-May-2023
  • (2022)Robust watermarking of databases in order-preserving encrypted domainFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-020-0112-z16:2Online publication date: 1-Apr-2022
  • (2022)A k-Anonymity-Based Robust Watermarking Scheme for Relational DatabaseScience of Cyber Security10.1007/978-3-031-17551-0_36(557-573)Online publication date: 10-Aug-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Knowledge and Data Engineering
IEEE Transactions on Knowledge and Data Engineering  Volume 16, Issue 12
December 2004
140 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 December 2004

Author Tags

  1. 65
  2. Index Terms- Rights protection
  3. information hiding.
  4. relational data
  5. watermarking

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Reversible Database Watermarking Based on Order-preserving Encryption for Data SharingACM Transactions on Database Systems10.1145/358976148:2(1-25)Online publication date: 13-May-2023
  • (2022)Robust watermarking of databases in order-preserving encrypted domainFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-020-0112-z16:2Online publication date: 1-Apr-2022
  • (2022)A k-Anonymity-Based Robust Watermarking Scheme for Relational DatabaseScience of Cyber Security10.1007/978-3-031-17551-0_36(557-573)Online publication date: 10-Aug-2022
  • (2021)A Quantile-Based Watermarking Approach for Distortion MinimizationFoundations and Practice of Security10.1007/978-3-031-08147-7_11(162-176)Online publication date: 7-Dec-2021
  • (2020)Verify a Valid Message in Single Tuple: A Watermarking Technique for Relational DatabaseDatabase Systems for Advanced Applications10.1007/978-3-030-59410-7_4(54-71)Online publication date: 24-Sep-2020
  • (2019)A New Robust and Reversible Watermarking Technique Based on Erasure CodeAlgorithms and Architectures for Parallel Processing10.1007/978-3-030-38991-8_11(153-168)Online publication date: 9-Dec-2019
  • (2018)Finding strongly connected components of simple digraphs based on generalized rough sets theoryKnowledge-Based Systems10.1016/j.knosys.2018.02.038149:C(88-98)Online publication date: 1-Jun-2018
  • (2017)A Minimum DistortionProceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security10.1145/3082031.3083241(111-121)Online publication date: 20-Jun-2017
  • (2017)Database watermarking, a technological protective measureJournal of Information Security and Applications10.1016/j.jisa.2017.10.00137:C(38-49)Online publication date: 1-Dec-2017
  • (2016)Enabling information recovery with ownership using robust multiple watermarksJournal of Information Security and Applications10.1016/j.jisa.2016.03.00529:C(80-92)Online publication date: 1-Aug-2016
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media