Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(606.66KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Data Security In Relational Database Management System
R.Balasubramaniam
Pages - 203 - 210     |    Revised - 15-07-2012     |    Published - 10-08-2012
Volume - 6   Issue - 4    |    Publication Date - August 2012  Table of Contents
MORE INFORMATION
KEYWORDS
Embedding Algorithm, Watermarking, Threshold Value
ABSTRACT
Proving ownerships rights on outsourced relational database is a crucial issue in today\'s internet based application environments and in many content distribution applications. Here mechanism is proposed for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data. Watermarking of relational databases as a constrained optimization problem and discus efficient techniques to solve the optimization problem and to handle the constraints. This watermarking technique is resilient to watermark synchronization errors because it uses a partioning approach that does not require marker tuple. This approach overcomes a major weakness in previously proposed watermarking techniques. Watermark decoding is based on a threshold-based technique characterized by an optimal threshold that minimizes the probability of decoding errors. An implemented a proof of concept implementation of our watermarking technique and showed by experimental results that our technique is resilient to tuple deletion, alteration and insertion attacks.
CITED BY (4)  
1 Rai, P. K., & Singh, P. (2015). Studies and Analysis of Popular Database Models.
2 Rodrigues, P., Belguinha, A., Gomes, C., Cardoso, P., Vilas, T., Mestre, R., & Rodrigues, J. M. F. (2013). Open source technologies involved in constructing a web-based football information system. In Advances in Information Systems and Technologies (pp. 715-723). Springer Berlin Heidelberg.
3 Syamala, P. J., Vimalai, R., & Vimala, R. Nav view search.
4 Shyamala, G., Jeya, I. J. S., & Revathi, M. Secure and Reliable Watermarking in Relational Databases.
1 Google Scholar
2 CiteSeerX
3 refSeek
4 Scribd
5 SlideShare
6 PdfSR
1 R. Agrawal and J. Kiernan, “Watermarking Relational Databases,” Proc. 28th Int’l Conf. Very Large Data Bases, 2002.
2 M. Atallah and S. Lonardi, “Authentication of LZ-77 Compressed Data,” Proc. ACM Symp. Applied Computing, 2003.
3 M. Atallah, V. Raskin, C. Hempelman, M. Karahan, R. Sion, K. Triezenberg, and U. Topkara, “Natural Language Watermarking and Tamperproofing,” Proc. Fifth Int’l Information Hiding Workshop, 2002.
4 G. Box, “Evolutionary Operation: A Method for Increasing Industrial Productivity,” Applied Statistics, vol. 6, no. 2, pp. 81- 101, 1957.
5 E. Chong and S. Z_ ak, An Introduction to Optimization. John Wiley & Sons, 2001.
6 D. Coley, “Introduction to Genetic Algorithms for Scientists and Engineers,” World Scientific, 1999.
7 C. Collberg and C. Thomborson, “Software Watermarking: Models and Dynamic Embeddings,” Proc. 26th ACM SIGPLANSIGACT Symp. Principles of Programming Languages, Jan. 1999.
8 I. Cox, J. Bloom, and M. Miller, Digital Watermarking. Morgan Kaufmann, 2001.
9 E. Dolan, R. Lewis, and V. Torczon, “On the Local Convergence of Pattern Search,” SIAM J. Optimization, vol. 14, no. 2, pp. 567-583, 2003.
10 F. Hartung and M. Kutter, “Multimedia Watermarking Techniques,” Proc. IEEE, vol. 87, no. 7, pp. 1079- 1107, July 1999.
11 Darshana Mistry, “Comparison of Digital Water Marking methods,” International Journal on Computer Science and Engineering - Vol. 02, No. 09, 2010, 2905-2909
12 Dolley Shukla and Manisha Sharma, “WATERMARKING SCHEMES FOR COPY PROTECTION: A SURVEY,” International Journal of Computer Science & Engineering Survey (IJCSES) Vol.3, No.1, February 2012
13 K.Ganesan and Tarun Kumar Guptha, “Multiple Binary Images Watermarking in Spatial and Frequency Domains,” Signal & Image Processing: An International Journal (SIPIJ) Vol.1, No.2, December 2010
Mr. R.Balasubramaniam
Kathir college of engineering - India
bala27788@gmail.com