Home   >   CSC-OpenAccess Library   >    Manuscript Information
Data Security In Relational Database Management System
R.Balasubramaniam
Pages - 203 - 210     |    Revised - 15-07-2012     |    Published - 10-08-2012
Volume - 6   Issue - 4    |    Publication Date - August 2012  Table of Contents
MORE INFORMATION
KEYWORDS
Embedding Algorithm, Watermarking, Threshold Value
ABSTRACT
Proving ownerships rights on outsourced relational database is a crucial issue in today\'s internet based application environments and in many content distribution applications. Here mechanism is proposed for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data. Watermarking of relational databases as a constrained optimization problem and discus efficient techniques to solve the optimization problem and to handle the constraints. This watermarking technique is resilient to watermark synchronization errors because it uses a partioning approach that does not require marker tuple. This approach overcomes a major weakness in previously proposed watermarking techniques. Watermark decoding is based on a threshold-based technique characterized by an optimal threshold that minimizes the probability of decoding errors. An implemented a proof of concept implementation of our watermarking technique and showed by experimental results that our technique is resilient to tuple deletion, alteration and insertion attacks.
CITED BY (4)  
1 Rai, P. K., & Singh, P. (2015). Studies and Analysis of Popular Database Models.
2 Rodrigues, P., Belguinha, A., Gomes, C., Cardoso, P., Vilas, T., Mestre, R., & Rodrigues, J. M. F. (2013). Open source technologies involved in constructing a web-based football information system. In Advances in Information Systems and Technologies (pp. 715-723). Springer Berlin Heidelberg.
3 Syamala, P. J., Vimalai, R., & Vimala, R. Nav view search.
4 Shyamala, G., Jeya, I. J. S., & Revathi, M. Secure and Reliable Watermarking in Relational Databases.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
I. Cox, J. Bloom, and M. Miller, Digital Watermarking. Morgan Kaufmann, 2001.
C. Collberg and C. Thomborson, “Software Watermarking: Models and Dynamic Embeddings,” Proc. 26th ACM SIGPLANSIGACT Symp. Principles of Programming Languages, Jan. 1999.
D. Coley, “Introduction to Genetic Algorithms for Scientists and Engineers,” World Scientific, 1999.
Darshana Mistry, “Comparison of Digital Water Marking methods,” International Journal on Computer Science and Engineering - Vol. 02, No. 09, 2010, 2905-2909
Dolley Shukla and Manisha Sharma, “WATERMARKING SCHEMES FOR COPY PROTECTION: A SURVEY,” International Journal of Computer Science & Engineering Survey (IJCSES) Vol.3, No.1, February 2012
E. Chong and S. Z_ ak, An Introduction to Optimization. John Wiley & Sons, 2001.
E. Dolan, R. Lewis, and V. Torczon, “On the Local Convergence of Pattern Search,” SIAM J. Optimization, vol. 14, no. 2, pp. 567-583, 2003.
F. Hartung and M. Kutter, “Multimedia Watermarking Techniques,” Proc. IEEE, vol. 87, no. 7, pp. 1079- 1107, July 1999.
G. Box, “Evolutionary Operation: A Method for Increasing Industrial Productivity,” Applied Statistics, vol. 6, no. 2, pp. 81- 101, 1957.
K.Ganesan and Tarun Kumar Guptha, “Multiple Binary Images Watermarking in Spatial and Frequency Domains,” Signal & Image Processing: An International Journal (SIPIJ) Vol.1, No.2, December 2010
M. Atallah and S. Lonardi, “Authentication of LZ-77 Compressed Data,” Proc. ACM Symp. Applied Computing, 2003.
M. Atallah, V. Raskin, C. Hempelman, M. Karahan, R. Sion, K. Triezenberg, and U. Topkara, “Natural Language Watermarking and Tamperproofing,” Proc. Fifth Int’l Information Hiding Workshop, 2002.
R. Agrawal and J. Kiernan, “Watermarking Relational Databases,” Proc. 28th Int’l Conf. Very Large Data Bases, 2002.
Mr. R.Balasubramaniam
Kathir college of engineering - India
bala27788@gmail.com


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS