Constructing a Virtual Primary Key for Fingerprinting Relational Data

Agrawal and Kiernan's watermarking technique for database relations [1] and Li et al's fingerprinting extension [6] both depend critically on primary key attributes. Hence, those techniques cannot embed marks in database relations without primary key attributes. Further, the techniques are...

Full description

Saved in:
Bibliographic Details
Main Authors: LI, Yingjiu, Swarup, Vipin, Jajodia, Sushil
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2003
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/541
http://dx.doi.org/10.1145/947380.947398
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-1540
record_format dspace
spelling sg-smu-ink.sis_research-15402010-09-24T08:24:04Z Constructing a Virtual Primary Key for Fingerprinting Relational Data LI, Yingjiu Swarup, Vipin Jajodia, Sushil Agrawal and Kiernan's watermarking technique for database relations [1] and Li et al's fingerprinting extension [6] both depend critically on primary key attributes. Hence, those techniques cannot embed marks in database relations without primary key attributes. Further, the techniques are vulnerable to simple attacks that alter or delete the primary key attribute.This paper proposes a new fingerprinting scheme that does not depend on a primary key attribute. The scheme constructs virtual primary keys from the most significant bits of some of each tuple's attributes. The actual attributes that are used to construct then virtual primary key differ from tuple to tuple. Attribute selection is based on a secret key that is known to the merchant only. Further, the selection does not depend on an apriori ordering over the attributes, or on knowledge of the original relation or fingerprint codeword.The virtual primary keys are then used in fingerprinting as in previous work [6]. Rigorous analysis shows that, with high probability, only embedded fingerprints can be detected and embedded fingerprints cannot be modified or erased by a variety of attacks. Attacks include adding, deleting, shuffling, or modifying tuples or attributes (including a primary key attribute if one exists), guessing secret keys, and colluding with other recipients of a relation. 2003-10-01T07:00:00Z text https://ink.library.smu.edu.sg/sis_research/541 info:doi/10.1145/947380.947398 http://dx.doi.org/10.1145/947380.947398 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information Security
spellingShingle Information Security
LI, Yingjiu
Swarup, Vipin
Jajodia, Sushil
Constructing a Virtual Primary Key for Fingerprinting Relational Data
description Agrawal and Kiernan's watermarking technique for database relations [1] and Li et al's fingerprinting extension [6] both depend critically on primary key attributes. Hence, those techniques cannot embed marks in database relations without primary key attributes. Further, the techniques are vulnerable to simple attacks that alter or delete the primary key attribute.This paper proposes a new fingerprinting scheme that does not depend on a primary key attribute. The scheme constructs virtual primary keys from the most significant bits of some of each tuple's attributes. The actual attributes that are used to construct then virtual primary key differ from tuple to tuple. Attribute selection is based on a secret key that is known to the merchant only. Further, the selection does not depend on an apriori ordering over the attributes, or on knowledge of the original relation or fingerprint codeword.The virtual primary keys are then used in fingerprinting as in previous work [6]. Rigorous analysis shows that, with high probability, only embedded fingerprints can be detected and embedded fingerprints cannot be modified or erased by a variety of attacks. Attacks include adding, deleting, shuffling, or modifying tuples or attributes (including a primary key attribute if one exists), guessing secret keys, and colluding with other recipients of a relation.
format text
author LI, Yingjiu
Swarup, Vipin
Jajodia, Sushil
author_facet LI, Yingjiu
Swarup, Vipin
Jajodia, Sushil
author_sort LI, Yingjiu
title Constructing a Virtual Primary Key for Fingerprinting Relational Data
title_short Constructing a Virtual Primary Key for Fingerprinting Relational Data
title_full Constructing a Virtual Primary Key for Fingerprinting Relational Data
title_fullStr Constructing a Virtual Primary Key for Fingerprinting Relational Data
title_full_unstemmed Constructing a Virtual Primary Key for Fingerprinting Relational Data
title_sort constructing a virtual primary key for fingerprinting relational data
publisher Institutional Knowledge at Singapore Management University
publishDate 2003
url https://ink.library.smu.edu.sg/sis_research/541
http://dx.doi.org/10.1145/947380.947398
_version_ 1770570467919265792