This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Rights Protection for Relational Data
December 2004 (vol. 16 no. 12)
pp. 1509-1525
In this paper, we introduce a solution for relational database content rights protection through watermarking. Rights protection for relational data is of ever-increasing interest, especially considering areas where sensitive, valuable content is to be outsourced. A good example is a data mining application, where data is sold in pieces to parties specialized in mining it. Different avenues are available, each with its own advantages and drawbacks. Enforcement by legal means is usually ineffective in preventing theft of copyrighted works, unless augmented by a digital counterpart, for example, watermarking. While being able to handle higher level semantic constraints, such as classification preservation, our solution also addresses important attacks, such as subset selection and random and linear data changes. We introduce wmdb.*, a proof-of-concept implementation and its application to real-life data, namely, in watermarking the outsourced Wal-Mart sales data that we have available at our institute.

[1] M.J. Atallah and S.S. WagstaffJr., “Watermarking with Quadratic Residues,” Proc. IS-T/SPIE Conf. Security and Watermarking of Multimedia Contents, SPIE, vol. 3657, pp. 283-288, 1999.
[2] M.J. Atallah, V. Raskin, C.F. Hempelmann, M. Karahan, R. Sion, K.E. Triezenberg, and U. Topkara, “Natural Language Watermarking and Tamperproofing,” Proc. Fifth Int'l Information Hiding Workshop, 2002.
[3] E. Bertino, M. Braun, S. Castano, E. Ferrari, and M. Mesiti, “Author-x: A Java-Based System for XML Data Protection,” Proc. IFIP Workshop Database Security, pp. 15-26, 2000.
[4] E. Bertino, S. Jajodia, and P. Samarati, “A Flexible Authorization Mechanism for Relational Data Management Systems,” ACM Trans. Information Systems, vol. 17, no. 2, 1999.
[5] C. Collberg and C. Thomborson, “On the Limits of Software Watermarking,” Technical Report #164, Dept. of Computer Science, The Univ. of Auckland, http://citeseer.ist.psu.educollberg98limits.html , Aug. 1998. Also available at http://csdl.computer.org/comp/trans/ts/2002/ 08e0735abs.htm.
[6] I. Cox, J. Bloom, and M. Miller, “Digital Watermarking,” Digital Watermarking, Morgan Kaufmann, 2001.
[7] D. Gross-Amblard, “Query-Preserving Watermarking of Relational Databases and XML Documents,” Proc. 19th ACM SIGMOD-SIGACT-SIGART Symp. Principles of Database Systems, 2003.
[8] J. Hale, J. Threet, and S. Shenoi, “A Framework for High Assurance Security of Distributed Objects,” Database Security, X: Status and Prospects, P. Samarati and R. Sandhu, eds., pp. 99-115, London: Chapman and Hall, 1997.
[9] E. Hildebrandt and G. Saake, “User Authentication in Multidatabase Systems,” Proc. Ninth Int'l Workshop Database and Expert Systems Applications, R.R. Wagner, ed., pp. 281-286, 1998.
[10] S. Jajodia, P. Samarati, and V.S. Subrahmanian, “A Logical Language for Expressing Authorizations,” Proc. IEEE Symp. Security and Privacy, pp. 31-42, 1997.
[11] S. Jajodia, P. Samarati, V.S. Subrahmanian, and E. Bertino, “A Unified Framework for Enforcing Multiple Access Control Policies,” Proc. SIGMOD, 1997.
[12] Information Hiding Techniques for Steganography and Digital Watermarking, S. Katzenbeisser and F. Petitcolas, eds. Artech House, 2001.
[13] J. Kiernan and R. Agrawal, “Watermarking Relational Databases,” Proc. 28th Int'l Conf. Very Large Databases VLDB, 2002.
[14] N Li, J. Feigenbaum, and B.N. Grosof, “A Logic-Based Knowledge Representation for Authorization with Delegation,” PCSFW: Proc. 12th Computer Security Foundations Workshop, 1999.
[15] M. Nyanchama and S.L. Osborn, “Access Rights Administration in Role-Based Security Systems,,” Proc. IFIP Workshop Database Security, pp. 37-56, 1994.
[16] S.L. Osborn, “Database Security Integration Using Role-Based Access Control,” Proc. IFIP Workshop Database Security, pp. 245-258, 2000.
[17] J. Palsberg, S. Krishnaswamy, M. Kwon, D. Ma, Q. Shao, and Y. Zhang, “Experience with Software Watermarking,” Proc. ACSAC, 16th Ann. Computer Security Applications Conf., pp. 308-316, 2000.
[18] F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, “Attacks on Copyright Marking Systems,” Proc. Information Hiding: Second Int'l Workshop, D. Aucsmith, ed., pp. 218-238, 1998.
[19] D. Rasikan, S.H. Son, and R. Mukkamala, “Supporting Security Requirements in Multilevel Real-Time Databases,” tr-95-21, 1995.
[20] R. Sion, M. Atallah, and S. Prabhakar, “On Watermarking Numeric Sets,” Proc. Int'l Workshop Digital Watermaking, 2002.
[21] R. Sion, M. Atallah, and S. Prabhakar, “Power: Metrics for Evaluating Watermarking Algorithms,” Proc. IEEE Int'l Conf. Information Technology: Coding and Computing , 2002.

Index Terms:
Rights protection, relational data, watermarking, information hiding.
Citation:
Radu Sion, Mikhail Atallah, Sunil Prabhakar, "Rights Protection for Relational Data," IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 12, pp. 1509-1525, Dec. 2004, doi:10.1109/TKDE.2004.94
Usage of this product signifies your acceptance of the Terms of Use.