2016
DOI: 10.15579/gcsr.vol5.ch2
|View full text |Cite
|
Sign up to set email alerts
|

Ownership and Tamper Detection of Relational Data: Framework, Techniques and Security Analysis

Abstract: Databases play a pivotal role in all domains of technology, encompassing data mining, medical records, stock market data, e-commerce etc. With this elevated need for databases and their wide distribution in the web sphere, their security has become a major concern today. It is in this context that watermarked protection of databases has started receiving increasing attention from researchers. We present two of the most important security concerns related to protection of relational database: (i) Ownership proo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…Other approaches based on virtual primary keys are proposed in [23]- [27]. Approaches in [23], [24] are similar to the M-Scheme. Two attributes having hash values near zero are considered.…”
Section: B: Virtual Primary Key Basedmentioning
confidence: 99%
See 1 more Smart Citation
“…Other approaches based on virtual primary keys are proposed in [23]- [27]. Approaches in [23], [24] are similar to the M-Scheme. Two attributes having hash values near zero are considered.…”
Section: B: Virtual Primary Key Basedmentioning
confidence: 99%
“…In [23], the textual attributes are considered. The VPK is generated based on two numeric attributes in [24]. Different attributes are selected each time in [25].…”
Section: B: Virtual Primary Key Basedmentioning
confidence: 99%
“…Several recent surveys have provided detailed discussion on relational database watermarking [1][2][3][4][5]. Robust reversible watermarking has also been investigated in many recent works [10][11][12][13].…”
Section: Previous Workmentioning
confidence: 99%
“…at is, they do not allow original data recovering from the watermarked relation [1][2][3][4]. erefore, although some distortion-free schemes exist in the literature [1][2][3][4][5][6][7][8][9], there is a need to develop a new generation of watermarking techniques that could efficiently address the abovementioned issues. To achieve that, reversible or lossless digital watermarking has been extended from multimedia assets to relational data to allow original data recovery at watermark detection.…”
Section: Introductionmentioning
confidence: 99%
“…Such techniques use a watermark string and create partitions using primary key and the binary string of watermark. The tuples in the partitions are then rearranged by comparison of their monotonicity, and relies on order of the tuples in the database to verify status of the database [17].…”
Section: Prior Workmentioning
confidence: 99%