Rights protection for relational data

被引:96
作者
Sion, R [1 ]
Atallah, M [1 ]
Prabhakar, S [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
基金
美国国家科学基金会;
关键词
rights protection; relational data; watermarking; information hiding;
D O I
10.1109/TKDE.2004.94
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we introduce a solution for relational database content rights protection through watermarking. Rights protection for relational data is of ever-increasing interest, especially considering areas where sensitive, valuable content is to be outsourced. A good example is a data mining application, where data is sold in pieces to parties specialized in mining it. Different avenues are available, each with its own advantages and drawbacks. Enforcement by legal means is usually ineffective in preventing theft of copyrighted works, unless augmented by a digital counterpart, for example, watermarking. While being able to handle higher level semantic constraints, such as classification preservation, our solution also addresses important attacks, such as subset selection and random and linear data changes. We introduce wmdb.*, a proof-of-concept implementation and its application to real-life data, namely, in watermarking the outsourced Wal-Mart sales data that we have available at our institute.
引用
收藏
页码:1509 / 1525
页数:17
相关论文
共 21 条
[1]   Watermarking with quadratic residues [J].
Atallah, MJ ;
Wagstaff, SS .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 :283-288
[2]  
Atallah MJ, 2002, P 5 INT INF HID WORK
[3]  
BERTINO E, 2000, P IFIP WORKSH DAT SE, P15
[4]  
BERTINO E, 1999, ACM T INFORMATION SY, V17
[5]  
COLLBERG C, 1998, 164 U AUCKL DEPT COM
[6]  
Cox I., 2001, Digital Watermarking
[7]  
GROSSAMBLARD D, 2003, P 19 ACM SIGMOD SIGA
[8]  
HALE J, 1997, DATABASE SECURITY, V10, P99
[9]   User authentication in multidatabase systems [J].
Hildebrandt, E ;
Saake, G .
NINTH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 1998, :281-286
[10]   A logical language for expressing authorizations [J].
Jajodia, S ;
Samarati, P ;
Subrahmanian, VS .
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, :31-42