A Novel Watermarking Approach for Data Integrity and Non-repudiation in Rational Databases

Thumbnail Image

Date

12/08/2012

Journal Title

Journal ISSN

Volume Title

Type

Article

Publisher

Springer, Berlin, Heidelberg

Series Info

International Conference on Advanced Machine Learning Technologies and Applications;p 532-542

Scientific Journal Rankings

Abstract

Keepinglarge scale data sets like data warehouse seems a vital demand of business organizations. Proving copyright, ownership, integrity and non-repudiation have a growing interest of database community. Many watermarking techniques have been proposed in the literature to address these purposes. This paper introduces a new technique WRDN (Watermarking Rational Database with Non-Repudiation) to protect the ownership of relational database by adding only one hidden column with a secret formula where it has the ability to know the latest updates made by users. The calculation of this formula is based on the values of other numeric and textual columns. Moreover, the proposed approach keeps track on the latest updates made to numeric and textual data by users. This approach is compared to two other alternative approaches. The proposed approach survives by 100% against insertion and deletion attacks.

Description

MSA Google Scholar

Keywords

Relational Database, Database Security, Copyright protection, Digital Watermarking

Citation

Agrawal, R., Kiernan, J.: Watermarking relational databases. Very Large Database (2002) Google Scholar 2. Albluwi, Q., Kamel, I.: Watermarking Essential Data Structures for Copyright Protection. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 241–258. Springer, Heidelberg (2006) CrossRefGoogle Scholar 3. Bhattacharya, S., Cortesi, A.: A distortion free watermark framework for relational databases. In: International Conference on Software and Data Technologies, ICSOFT (2009) Google Scholar 4. Bhattacharya, S., Cortesi, A.: A Generic Distortion Free Watermarking Technique for Relational Databases. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 252–264. Springer, Heidelberg (2009) CrossRefGoogle Scholar 5. Bhattacharya, S., Cortesi, A.: Database authentication by distortion free watermarking. In: International Conference on Software and Data Technologies. ICSOFT, vol. 5 (2010) Google Scholar 6. Daemen, J., Rijmen, V.: The first 10 years of advanced encryption. IEEE Security and Privacy 8, 6 (2010) CrossRefGoogle Scholar 7. El-Bakry, H., Hamada, M.: A Novel Watermark Technique for Relational Databases. In: Wang, F.L., Deng, H., Gao, Y., Lei, J. (eds.) AICI 2010, Part II. LNCS, vol. 6320, pp. 226–232. Springer, Heidelberg (2010) CrossRefGoogle Scholar 8. Gamal, G., Rashad, M., Mohamed, M.: A simple watermark technique for relational database. In: Mansoura Journal for Computer Science and Information System (2008) Google Scholar 9. Halder, R., Pal, S., Cortesi, A.: Watermarking techniques for relational databases: Survey, classification and comparison. Journal of Universal Computer Science 16(22) (2010) Google Scholar 10. Kamel, I.: A schema for protecting the integrity of databases. Computers& Security 28 (2009) Google Scholar 11. Katz, J., Lindell, Y.: Introduction to Modern Cryptography, ch. 12. Chapman & Hall/CRC Press (2007) Google Scholar 12. Khataeimaragheh, H., Rashidi, H.: A novel watermarking scheme for detecting and recovering distortions in database tables. International Journal of Database Management Systems 2 (2010) Google Scholar 13. Li, Y., Deng, R.H.: Publicly verifiable ownership protection for relational databases. In: ACM Symposium on Information, Computer and Communications Security, ASIACCS (2006) Google Scholar 14. Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. ACM (2004) Google Scholar 15. Li, Y., Swarup, V., Jajodia, S.: Constructing a virtual primary key for fingerprinting relational data. In: Digital Rights Management Workshop 2003 (2003) Google Scholar 16. Liu, S., Wang, S., Deng, R.H., Shao, W.: A Block Oriented Fingerprinting Scheme in Relational Database. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 455–466. Springer, Heidelberg (2005) CrossRefGoogle Scholar 17. Menezes, A., Smart, N.: Security of signature schemes in a multi-user setting. Des. Codes Cryptography 33, 3 (2004) MathSciNetCrossRefGoogle Scholar 18. Narasimha, M., Tsudik, G.: Authentication of Outsourced Databases Using Signature Aggregation and Chaining. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol. 3882, pp. 420–436. Springer, Heidelberg (2006) CrossRefGoogle Scholar 19. Nikodem, M.: DSA Signature Scheme Immune to the Fault Cryptanalysis. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 61–73. Springer, Heidelberg (2008) CrossRefGoogle Scholar 20. Olivier Blazy, D.P., Fuchsbauer, G., Vergnaud, D.: Signatures on randomizable ciphertexts. In: International Conference on Theory and Practice in Public Key Cryptography, PKC (2011) Google Scholar 21. Pournaghshband, V.: A new watermarking approach for relational data. In: ACM Southeast Regional Conference, pp. 127–131 (2008) Google Scholar 22. Prasannakumari, V.: A roubust tamperproof watermarking for data integrity in relational database. Research Journal of Information Technology 1, 115–121 (2009) CrossRefGoogle Scholar 23. Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data. IEEE Transactions on Knowledge and Data Engineering (2004) Google Scholar 24. Sion, R., Atallah, M., Prabhakar, S.: Rights protection for categorical data. IEEE Transactions on Knowledge and Data Engineering (2005) Google Scholar 25. Zhang, Y., Niu, X., Zhao, D.: A method of protecting relational databases copyright with cloud watermark. International Journal of Information Technology 1(3) (2004)