DocumentCode :
2118570
Title :
Leakage Identification for Secret Relational Data Using Shadowed Watermarks
Author :
Xian, Hequn ; Feng, Dengguo
Author_Institution :
State Key Lab. of Inf. Security, Chinese Acad. of Sci. Beijing, Beijing
fYear :
2009
fDate :
27-28 Feb. 2009
Firstpage :
473
Lastpage :
478
Abstract :
Various database watermarking techniques have been developed to protect the ownership of relational data, some provide extra utilities for pirate identification. In all the proposed schemes, the data owner controls the watermark key and the watermark generation process, which makes it possible for the owner to falsely accuse an innocent user of pirating. In this paper, we propose a novel watermark scheme to solve the problem of leakage identification for secret relational data, which is a small-scaled pirate identification problem. We devise a scheme that combines two keys to generate a shadowed watermark, and we design a protocol to bind the data distribution to the identities of both the owner and the user. A user is able to prove his innocence if falsely accused, so that both parties are fairly protected. We provide probabilistic analyses for the effectiveness and security of our scheme, and we test its performance to conclude that the scheme is qualified for practical use.
Keywords :
relational databases; watermarking; database watermarking techniques; leakage identification; relational data; shadowed watermarks; watermark generation process; Data security; Electronic mail; Fingerprint recognition; Information security; Laboratories; Performance analysis; Protection; Protocols; Relational databases; Watermarking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Software and Networks, 2009. ICCSN '09. International Conference on
Conference_Location :
Macau
Print_ISBN :
978-0-7695-3522-7
Type :
conf
DOI :
10.1109/ICCSN.2009.128
Filename :
5076896
Link To Document :
بازگشت