Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Data Security In Relational Database Management System
R.Balasubramaniam
Pages - 203 - 210 | Revised - 15-07-2012 | Published - 10-08-2012
MORE INFORMATION
KEYWORDS
Embedding Algorithm, Watermarking, Threshold Value
ABSTRACT
Proving ownerships rights on outsourced relational database is a crucial issue in today\'s internet based application environments and in many content distribution applications. Here mechanism is proposed for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data. Watermarking of relational databases as a constrained optimization problem and discus efficient techniques to solve the optimization problem and to handle the constraints. This watermarking technique is resilient to watermark synchronization errors because it uses a partioning approach that does not require marker tuple. This approach overcomes a major weakness in previously proposed watermarking techniques. Watermark decoding is based on a threshold-based technique characterized by an optimal threshold that minimizes the probability of decoding errors. An implemented a proof of concept implementation of our watermarking technique and showed by experimental results that our technique is resilient to tuple deletion, alteration and insertion attacks.
1 | Rai, P. K., & Singh, P. (2015). Studies and Analysis of Popular Database Models. |
2 | Rodrigues, P., Belguinha, A., Gomes, C., Cardoso, P., Vilas, T., Mestre, R., & Rodrigues, J. M. F. (2013). Open source technologies involved in constructing a web-based football information system. In Advances in Information Systems and Technologies (pp. 715-723). Springer Berlin Heidelberg. |
3 | Syamala, P. J., Vimalai, R., & Vimala, R. Nav view search. |
4 | Shyamala, G., Jeya, I. J. S., & Revathi, M. Secure and Reliable Watermarking in Relational Databases. |
I. Cox, J. Bloom, and M. Miller, Digital Watermarking. Morgan Kaufmann, 2001. | |
C. Collberg and C. Thomborson, “Software Watermarking: Models and Dynamic Embeddings,” Proc. 26th ACM SIGPLANSIGACT Symp. Principles of Programming Languages, Jan. 1999. | |
D. Coley, “Introduction to Genetic Algorithms for Scientists and Engineers,” World Scientific, 1999. | |
Darshana Mistry, “Comparison of Digital Water Marking methods,” International Journal on Computer Science and Engineering - Vol. 02, No. 09, 2010, 2905-2909 | |
Dolley Shukla and Manisha Sharma, “WATERMARKING SCHEMES FOR COPY PROTECTION: A SURVEY,” International Journal of Computer Science & Engineering Survey (IJCSES) Vol.3, No.1, February 2012 | |
E. Chong and S. Z_ ak, An Introduction to Optimization. John Wiley & Sons, 2001. | |
E. Dolan, R. Lewis, and V. Torczon, “On the Local Convergence of Pattern Search,” SIAM J. Optimization, vol. 14, no. 2, pp. 567-583, 2003. | |
F. Hartung and M. Kutter, “Multimedia Watermarking Techniques,” Proc. IEEE, vol. 87, no. 7, pp. 1079- 1107, July 1999. | |
G. Box, “Evolutionary Operation: A Method for Increasing Industrial Productivity,” Applied Statistics, vol. 6, no. 2, pp. 81- 101, 1957. | |
K.Ganesan and Tarun Kumar Guptha, “Multiple Binary Images Watermarking in Spatial and Frequency Domains,” Signal & Image Processing: An International Journal (SIPIJ) Vol.1, No.2, December 2010 | |
M. Atallah and S. Lonardi, “Authentication of LZ-77 Compressed Data,” Proc. ACM Symp. Applied Computing, 2003. | |
M. Atallah, V. Raskin, C. Hempelman, M. Karahan, R. Sion, K. Triezenberg, and U. Topkara, “Natural Language Watermarking and Tamperproofing,” Proc. Fifth Int’l Information Hiding Workshop, 2002. | |
R. Agrawal and J. Kiernan, “Watermarking Relational Databases,” Proc. 28th Int’l Conf. Very Large Data Bases, 2002. | |
Mr. R.Balasubramaniam
Kathir college of engineering - India
bala27788@gmail.com
|
|
|
|
View all special issues >> | |
|
|