Fingerprinting of Relational Databases for Stopping the Data Theft

The currently-emerging technology demands sharing of data using various channels via the Internet, disks, etc. Some recipients of this data can also become traitors by leaking the important data. As a result, the data breaches due to data leakage are also increasing. These breaches include unauthorized distribution, duplication, and sale. The identification of a guilty agent responsible for such breaches is important for: (i) punishing the culprit; and (ii) preventing the innocent user from accusation and punishment. Fingerprinting techniques provide a mechanism for classifying the guilty agent from multiple recipients and also help to prevent the innocent user from being accused of the data breach. To those ends, in this paper, a novel fingerprinting framework has been proposed using a biometric feature as a digital mark (signature). The use of machine learning has also been introduced to make this framework intelligent, particularly for preserving the data usability. An attack channel has also been used to evaluate the robustness of the proposed scheme. The experimental study was also conducted to demonstrate that the proposed technique is robust against several malicious attacks, such as subset selection attacks, mix and match attacks, collusion attacks, deletion attacks, insertion attacks, and alteration attacks.

[1]  Pierre Moulin,et al.  Performance of Orthogonal Fingerprinting Codes Under Worst-Case Noise , 2009, IEEE Transactions on Information Forensics and Security.

[2]  Claudia Feregrino Uribe,et al.  HQR-Scheme: A High Quality and resilient virtual primary key generation approach for watermarking relational data , 2019, Expert Syst. Appl..

[3]  Muddassar Farooq,et al.  A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints , 2013, IEEE Transactions on Knowledge and Data Engineering.

[4]  Sushil Jajodia,et al.  Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.

[5]  Shampa Chakraverty,et al.  A generic watermarking model for object relational databases , 2019, Multimedia Tools and Applications.

[6]  Binod Kumar Singh,et al.  A Recent Survey on Multimedia and Database Watermarking , 2020, Multimedia Tools and Applications.

[7]  Abdul Rauf Baig,et al.  Relational database security using digital watermarking and evolutionary techniques , 2019, Comput. Intell..

[8]  Arti Arun Mohanpurkar,et al.  A Traitor Identification Technique for Numeric Relational Databases with Distortion Minimization and Collusion Avoidance , 2016, Int. J. Ambient Comput. Intell..

[9]  Radu Sion,et al.  Rights Protection for Relational Data , 2004, IEEE Trans. Knowl. Data Eng..

[10]  Dan Zhao,et al.  A New Robust Approach for Reversible Database Watermarking with Distortion Control , 2019, IEEE Transactions on Knowledge and Data Engineering.

[11]  Alexander Barg,et al.  Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.

[12]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[13]  Madhuri S. Joshi,et al.  Fingerprinting Numeric Databases with Information Preservation and Collusion Avoidance , 2015 .

[14]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..