skip to main content
10.1145/872757.872772acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
Article

Rights protection for relational data

Published:09 June 2003Publication History

ABSTRACT

Protecting rights over relational data is of ever increasing interest, especially considering areas where sensitive, valuable content is to be outsourced. A good example is a data mining application, where data is sold in pieces to parties specialized in mining it.Different avenues for rights protection are available, each with its own advantages and drawbacks. Enforcement by legal means is usually ineffective in preventing theft of copyrighted works, unless augmented by a digital counter-part, for example watermarking.Recent research of the authors introduces the issue of digital watermarking for generic number sets. In the present paper we expand on this foundation and introduce a solution for relational database content rights protection through watermarking.Our solution addresses important attacks, such as data re-sorting, subset selection, linear data changes (applying a linear transformation on arbitrary subsets of the data). Our watermark also survives up to 50% and above data loss.Finally we present wmdb.*, a proof-of-concept implementation of our algorithm and its application to real life data, namely in watermarking the outsourced Wal-Mart sales data that we have available at our institute.

References

  1. M. J. Atallah and Jr. S. S. Wagstaff. Watermarking with quadratic residues. In Proc. of IS-T/SPIE Conf. on Security and Watermarking of Multimedia Contents, SPIE Vol. 3657, pp. 283--288., 1999.]]Google ScholarGoogle ScholarCross RefCross Ref
  2. M. J. Atallah, V. Raskin (with M. Crogan, C. Hempelmann, F. Kerschbaum, D. Mohamed, and S. Naik). Natural language watermarking: Design, analysis, and a proof-of-concept implementation. In Lecture Notes in Computer Science, Proc. 4th International Information Hiding Workshop, Pittsburgh, Pennsylvania. Springer Verlag, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Elisa Bertino, M. Braun, Silvana Castano, Elena Ferrari, and Marco Mesiti. Author-x: A java-based system for XML data protection. In IFIP Workshop on Database Security, pages 15--26, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Elisa Bertino, Sushil Jajodia, and Pierangela Samarati. Affexible authorization mechanism for relational data management systems. ACM Trans. on Information Systems, 17(2), 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Christian Collberg and Clark Thomborson. On the limits of software watermarking, August 1998.]]Google ScholarGoogle Scholar
  6. Ingemar Cox, Jeffrey Bloom, and Matthew Miller. Digital watermarking. In Digital Watermarking. Morgan Kaufmann, 2001.]]Google ScholarGoogle Scholar
  7. Stefan Katzenbeisser (editor) and Fabien Petitcolas (editor). Information hiding techniques for steganography and digital watermarking. In Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, 2001.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Hale, J. Threet, and S. Shenoi. A framework for high assurance security of distributed objects, 1997.]]Google ScholarGoogle Scholar
  9. S. Jajodia, P. Samarati, and V. S. Subrahmanian. A logical language for expressing authorizations. In IEEE Symposium on Security and Privacy. Oakland, CA, pages 31--42, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A unified framework for enforcing multiple access control policies. In SIGMOD, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Kiernan and R. Agrawal. Watermarking relational databases. In Proceedings of the 28th International Conference on Very Large Databases VLDB, 2002.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Li, Feigenbaum, and Grosof. A logic-based knowledge representation for authorization with delegation. In PCSFW: Proc. of The 12th Computer Security Foundations Workshop, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Nyanchama and S. L. Osborn. Access rights administration in role-based security systems. In IFIP Workshop on Database Security, pages 37--56, 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. Palsberg, S. Krishnaswamy, M. Kwon, D. Ma, Q. Shao, and Y. Zhang. Experience with software watermarking. In Proceedings of ACSAC, 16th Annual Computer Security Applications Conference, pages 308--316, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Attacks on copyright marking systems. In David Aucsmith, editor, Information Hiding: Second International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 218--238, Portland, Oregon, U.S.A., 1998. Springer-Verlag.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Radu Sion, Mikhail Atallah, and Sunil Prabhakar. On watermarking numeric sets. In Proceedings of IWDW 2002, Lecture Notes in Computer Science, CERIAS TR 2001-60. Springer-Verlag, 2002.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Radu Sion, Mikhail Atallah, and Sunil Prabhakar. On watermarking semistructures. In (submission for review), CERIAS TR 2001-54, 2002.]]Google ScholarGoogle Scholar
  18. Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Power: Metrics for evaluating watermarking algorithms. In Proceedings of IEEE ITCC 2002, CERIAS TR 2001-55. IEEE Computer Society Press, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Rights protection for relational data

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                SIGMOD '03: Proceedings of the 2003 ACM SIGMOD international conference on Management of data
                June 2003
                702 pages
                ISBN:158113634X
                DOI:10.1145/872757

                Copyright © 2003 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 9 June 2003

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • Article

                Acceptance Rates

                SIGMOD '03 Paper Acceptance Rate53of342submissions,15%Overall Acceptance Rate785of4,003submissions,20%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader