DocumentCode
2118570
Title
Leakage Identification for Secret Relational Data Using Shadowed Watermarks
Author
Xian, Hequn ; Feng, Dengguo
Author_Institution
State Key Lab. of Inf. Security, Chinese Acad. of Sci. Beijing, Beijing
fYear
2009
fDate
27-28 Feb. 2009
Firstpage
473
Lastpage
478
Abstract
Various database watermarking techniques have been developed to protect the ownership of relational data, some provide extra utilities for pirate identification. In all the proposed schemes, the data owner controls the watermark key and the watermark generation process, which makes it possible for the owner to falsely accuse an innocent user of pirating. In this paper, we propose a novel watermark scheme to solve the problem of leakage identification for secret relational data, which is a small-scaled pirate identification problem. We devise a scheme that combines two keys to generate a shadowed watermark, and we design a protocol to bind the data distribution to the identities of both the owner and the user. A user is able to prove his innocence if falsely accused, so that both parties are fairly protected. We provide probabilistic analyses for the effectiveness and security of our scheme, and we test its performance to conclude that the scheme is qualified for practical use.
Keywords
relational databases; watermarking; database watermarking techniques; leakage identification; relational data; shadowed watermarks; watermark generation process; Data security; Electronic mail; Fingerprint recognition; Information security; Laboratories; Performance analysis; Protection; Protocols; Relational databases; Watermarking;
fLanguage
English
Publisher
ieee
Conference_Titel
Communication Software and Networks, 2009. ICCSN '09. International Conference on
Conference_Location
Macau
Print_ISBN
978-0-7695-3522-7
Type
conf
DOI
10.1109/ICCSN.2009.128
Filename
5076896
Link To Document