A new Relational Watermarking Scheme Resilient to Additive Attacks

  • Manjula R
  • Settipalli N
N/ACitations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

Strengthening the ownership rights on outsourced relational database is very important in today's internet environment. Especially where sensitive, valuable content is to be outsourced. Let us take an example of university database, weather data, stock market data, power consumption consumer behaviour data, and medical and scientific data. The increasing use of databases in applications beyond "behind-the-firewalls data processing" is creating a need for watermarking relational databases. Watermarking for relational data is made possible by fact that real data can very often tolerate a small amount of errors without any significant degradation with respect to their usability. In this paper, we present a mechanism that is resilient or insensitive to additive attacks, how to embed and detect watermark in relational database. In additive attack the attacker simply inserts his/her own watermark in original data. In our proposed system we can draw graphs and original ownership claim can be resolved by locating the overlapping regions of the two watermarks in which the bit values of the marks conflict and determining which owner's mark win. The attacker must have inserted the watermark later. Clearly having more marked tuples increases collisions and hence we can easily identify the owner of the data.

Cite

CITATION STYLE

APA

Manjula, R., & Settipalli, Nagarjuna. (2010). A new Relational Watermarking Scheme Resilient to Additive Attacks. International Journal of Computer Applications, 10(5), 1–7. https://doi.org/10.5120/1481-1998

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free