CFP last date
20 January 2025
Reseach Article

Fingerprinting Numeric Databases with Information Preservation and Collusion Avoidance

by Arti Mohanpurkar, Madhuri Joshi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 5
Year of Publication: 2015
Authors: Arti Mohanpurkar, Madhuri Joshi
10.5120/ijca2015906957

Arti Mohanpurkar, Madhuri Joshi . Fingerprinting Numeric Databases with Information Preservation and Collusion Avoidance. International Journal of Computer Applications. 130, 5 ( November 2015), 13-18. DOI=10.5120/ijca2015906957

@article{ 10.5120/ijca2015906957,
author = { Arti Mohanpurkar, Madhuri Joshi },
title = { Fingerprinting Numeric Databases with Information Preservation and Collusion Avoidance },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 5 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 13-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number5/23204-2015906957/ },
doi = { 10.5120/ijca2015906957 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:24:32.690282+05:30
%A Arti Mohanpurkar
%A Madhuri Joshi
%T Fingerprinting Numeric Databases with Information Preservation and Collusion Avoidance
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 5
%P 13-18
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information age demands omnipresence of data. Large data sets are created, maintained and outsourced to the third party experts for data mining. Knowledge and patterns are extracted by using advanced data mining algorithms that assist the decision makers to ensure quick, correct and effective decisions to be made in this world of competition. The outsourcing of these large data sets faces the problem of theft and loss of ownership. The problem of data theft can be handled by fingerprinting i.e. embedding buyer specific marks along with ownership identification marks which further leads to the challenge of knowledge preservation. Thus, a technique which performs fingerprinting with knowledge preservation on numeric relational data to be outsourced is proposed here. It is ensured that the usability constraints are not violated. Knowledge preservation is achieved by optimizing the error to be inserted using Particle Swarm Optimization (PSO), a nature – inspired optimization algorithm. Collusion attack is very well-known in the context of fingerprinting techniques. Here, the proposed system provides a mechanism for avoiding collusion. The proposed system is independent of the primary key.

References
  1. M. Kamran and Muddassar Farooq, “A Formal Usability Constraints Model for Watermarking of Outsourced Datasets”, IEEE transactions on information forensics and security, Vol. 8, no. 6, June 2013, pp. 1061-1072.
  2. M. Kamran and Muddassar Farooq, “An Information-Preserving Watermarking Scheme for Right Protection of EMR Systems", IEEE Transactions on Knowledge and Data Engineering, Vol. 24, No. 11, November 2012, pp. 1950-1962.
  3. Dan Boneh and James Shaw, “Collusion Secure Fingerprinting For Digital data”, IEEE Transaction on Information Theory, Vol. 44, No. 5, September 1998, pp. 1897 – 1905.
  4. Gabor Tardos, “Optimal Probabilistic Fingerprint Codes”, Journal of ACM, Vol. 55, No. 2, Article 10, May 2008, pp. 10 – 24.
  5. Rakesh Agrawal, Peter J Haas, Jerry Kiernan, “Watermarking relational data: framework, algorithm and analysis”, The VLDB Journal (2003)/ Digital object identifier (DOI) 10.1007/s00778-003-0097-x, pp. 157-169.
  6. Radu Sion, Mikhail Atallah, Sunil Prabhakar “Rights Protection for Relational Data” IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 06, June 2004, pp. 1509-1525.
  7. Yingjiu Li, "Fingerprinting Relational Databases: Schemes and Specialties", IEEE Transactions On Dependable And Secure Computing, Vol. 2, NO. 1, January-March 2005, pp. 34-45.
  8. Mohamed Shehab, Elisa Bertino, Arif Ghafoor, “Watermarking Relational Databases Using Optimization-Based Techniques”, IEEE Transactions on Knowledge and Data Engineering, January 2008, vol. 20, No. 1, pp. 116-129.
  9. Julien Lafaye, David Gross-Amblard, Camelia Constantin, and Guerrouani, “Watermill: An Optimized Fingerprinting System for Databases under Constraints”, IEEE Transactions on Knowledge and Data Engineering, vol.20, No.4, APRIL 2008, pp. 532-546.
  10. Ersin Uzun and Bryan Stephenson, “Security of Relational Databases in Business Outsourcing”, HP Laboratories, HPL-2008-168, pp. 1-21.
  11. Raju Halder, Shantanu Pal, Agostino Cortesi, "Watermarking Techniques for Relational Databases: Survey, Classification and Comparison", Journal of Universal Computer Science, Vol. 16, no. 21 (2010), pp. 46-52.
  12. M. Kamran, Sabah Suhail, and Muddassar Farooq, “A Robust, Distortion Minimizing Technique for Watermarking relational Databases Using Once-for-all Usability Constraints”, IEEE Transactions on Knowledge and Data Engineering , vol.25, no. 12, 2013, pp. 2694 – 2707.
  13. A. A. Mohanpurkar, M. S. Joshi, “Applying Watermarking For Copyright Protection, Traitor Identification And Joint ownership: A Review” presented at International IEEE Conference WICT 2011, co-organized by Machine Intelligence Research Labs (MIR Labs) and University of Mumbai, India, during 12th to 14th Dec. 2011, p.p.1018-1023.
  14. Ms. Varsha Waghmode, Ms. A. A. Mohanpurkar, “Collusion Avoidance in Fingerprinting Outsourced Relational Databases with Knowledge Preservation”, International Journal on Recent and Innovation Trends in Computing and Communication,Volume 2, Issue 5, May 2014, pp.1332 – 1337.
  15. Ms. Namrata Gursale, Ms. Arti Mohanpurkar, “A Robust, Distortion Minimization Fingerprinting Technique for Relational Database”, International Journal on Recent and Innovation Trends in Computing and Communication ,Volume: 2 Issue: 6, June 2015, pp. 1737 – 1741.
  16. Arti Mohanpurkar, Madhuri Joshi, “A Fingerprinting Technique for Numeric Relational Databases with Distortion Minimization ”, 2015 International Conference on Computing Communication Control and Automation, IEEE DOI 10.1109/ICCUBEA.2015.134, pp. 655-660.
Index Terms

Computer Science
Information Sciences

Keywords

Watermarking Fingerprinting Collusion Knowledge preservation Optimization.