ABSTRACT
Protecting rights over relational data is of ever increasing interest, especially considering areas where sensitive, valuable content is to be outsourced. A good example is a data mining application, where data is sold in pieces to parties specialized in mining it.Different avenues for rights protection are available, each with its own advantages and drawbacks. Enforcement by legal means is usually ineffective in preventing theft of copyrighted works, unless augmented by a digital counter-part, for example watermarking.Recent research of the authors introduces the issue of digital watermarking for generic number sets. In the present paper we expand on this foundation and introduce a solution for relational database content rights protection through watermarking.Our solution addresses important attacks, such as data re-sorting, subset selection, linear data changes (applying a linear transformation on arbitrary subsets of the data). Our watermark also survives up to 50% and above data loss.Finally we present wmdb.*, a proof-of-concept implementation of our algorithm and its application to real life data, namely in watermarking the outsourced Wal-Mart sales data that we have available at our institute.
- M. J. Atallah and Jr. S. S. Wagstaff. Watermarking with quadratic residues. In Proc. of IS-T/SPIE Conf. on Security and Watermarking of Multimedia Contents, SPIE Vol. 3657, pp. 283--288., 1999.]]Google ScholarCross Ref
- M. J. Atallah, V. Raskin (with M. Crogan, C. Hempelmann, F. Kerschbaum, D. Mohamed, and S. Naik). Natural language watermarking: Design, analysis, and a proof-of-concept implementation. In Lecture Notes in Computer Science, Proc. 4th International Information Hiding Workshop, Pittsburgh, Pennsylvania. Springer Verlag, 2001.]] Google ScholarDigital Library
- Elisa Bertino, M. Braun, Silvana Castano, Elena Ferrari, and Marco Mesiti. Author-x: A java-based system for XML data protection. In IFIP Workshop on Database Security, pages 15--26, 2000.]] Google ScholarDigital Library
- Elisa Bertino, Sushil Jajodia, and Pierangela Samarati. Affexible authorization mechanism for relational data management systems. ACM Trans. on Information Systems, 17(2), 1999.]] Google ScholarDigital Library
- Christian Collberg and Clark Thomborson. On the limits of software watermarking, August 1998.]]Google Scholar
- Ingemar Cox, Jeffrey Bloom, and Matthew Miller. Digital watermarking. In Digital Watermarking. Morgan Kaufmann, 2001.]]Google Scholar
- Stefan Katzenbeisser (editor) and Fabien Petitcolas (editor). Information hiding techniques for steganography and digital watermarking. In Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, 2001.]]Google ScholarDigital Library
- J. Hale, J. Threet, and S. Shenoi. A framework for high assurance security of distributed objects, 1997.]]Google Scholar
- S. Jajodia, P. Samarati, and V. S. Subrahmanian. A logical language for expressing authorizations. In IEEE Symposium on Security and Privacy. Oakland, CA, pages 31--42, 1997.]] Google ScholarDigital Library
- S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A unified framework for enforcing multiple access control policies. In SIGMOD, 1997.]] Google ScholarDigital Library
- J. Kiernan and R. Agrawal. Watermarking relational databases. In Proceedings of the 28th International Conference on Very Large Databases VLDB, 2002.]]Google ScholarDigital Library
- Li, Feigenbaum, and Grosof. A logic-based knowledge representation for authorization with delegation. In PCSFW: Proc. of The 12th Computer Security Foundations Workshop, 1999.]] Google ScholarDigital Library
- M. Nyanchama and S. L. Osborn. Access rights administration in role-based security systems. In IFIP Workshop on Database Security, pages 37--56, 1994.]] Google ScholarDigital Library
- J. Palsberg, S. Krishnaswamy, M. Kwon, D. Ma, Q. Shao, and Y. Zhang. Experience with software watermarking. In Proceedings of ACSAC, 16th Annual Computer Security Applications Conference, pages 308--316, 2000.]] Google ScholarDigital Library
- Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Attacks on copyright marking systems. In David Aucsmith, editor, Information Hiding: Second International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 218--238, Portland, Oregon, U.S.A., 1998. Springer-Verlag.]] Google ScholarDigital Library
- Radu Sion, Mikhail Atallah, and Sunil Prabhakar. On watermarking numeric sets. In Proceedings of IWDW 2002, Lecture Notes in Computer Science, CERIAS TR 2001-60. Springer-Verlag, 2002.]]Google ScholarDigital Library
- Radu Sion, Mikhail Atallah, and Sunil Prabhakar. On watermarking semistructures. In (submission for review), CERIAS TR 2001-54, 2002.]]Google Scholar
- Radu Sion, Mikhail Atallah, and Sunil Prabhakar. Power: Metrics for evaluating watermarking algorithms. In Proceedings of IEEE ITCC 2002, CERIAS TR 2001-55. IEEE Computer Society Press, 2002.]] Google ScholarDigital Library
Index Terms
- Rights protection for relational data
Recommendations
Rights Protection for Relational Data
In this paper, we introduce a solution for relational database content rights protection through watermarking. Rights protection for relational data is of ever-increasing interest, especially considering areas where sensitive, valuable content is to be ...
Ontologies for intellectual property rights protection
Pirating various forms of intellectual property (IP) causes great economic loss to intellectual property rights (IPR) holders. IPR protection is becoming a key issue in our highly networked world. In order to further deepen our understanding of how to ...
Privacy Rights and Protection: Foreign Values in Modern Thai Context
The concept of privacy as a basic human right which has to be protected by law is a recently adopted concept in Thailand, as the protection of human rights was only legally recognized by the National Human Rights Act in 1999. Moreover, along with other ...
Comments