Localizing unauthorized updates in published micro-data tables through secret order-based watermarking

作者: Shuai Liu

DOI:

关键词:

摘要: The study of micro-data disclosure issue has largely focused on the privacy preservation aspect, whereas integrity a published table received limited attention. Unauthorized updates to such may lead users believe in misleading data. Traditional cryptographic stamp-based approaches allow detect unauthorized using credentials issued by data owner. However, localize exact corrupted tuples would require large number stamps be stored, leading prohibitive storage requirements. In this thesis, we explore fact that must stored particular order, which no inherent meaning under relational model. We propose series algorithms for embedding watermarks through reordering tuples. embedded detect, localize, and restore with single secret key owner, additional is required. At same time, our also efficient owner or legitimate who know key. proposed are implemented evaluated experiments real

参考文章(55)
Alin Deutsch, Privacy in Database Publishing: A Bayesian Perspective Handbook of Database Security. pp. 461- 487 ,(2008) , 10.1007/978-0-387-48533-1_19
Rina Panigrahy, Rajeev Motwani, Krishnaram Kenthapadi, Dilys Thomas, Tomas Feder, Gagan Aggarwal, An Zhu, Approximation Algorithms for k-Anonymity Journal of Privacy Technology. ,(2005)
Adrian Dobra, Stephen E. Fienberg, Bounding Entries in Multi-way Contingency Tables Given a Set of Marginal Totals Physica, Heidelberg. pp. 3- 16 ,(2003) , 10.1007/978-3-642-57410-8_1
Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky, Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security. pp. 190- 204 ,(2008) , 10.1007/978-3-540-70567-3_15
Premkumar Devanbu, Michael Gertz, Charles Martel, Stuart G. Stubblebine, Authentic Third-party Data Publication Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions. pp. 101- 112 ,(2000) , 10.1007/0-306-47008-X_9
Edward J. Delp, Eugene T. Lin, A Review of Fragile Image Watermarks ,(2007)
Ralph C. Merkle, A Certified Digital Signature international cryptology conference. pp. 218- 238 ,(1989) , 10.1007/0-387-34805-0_21
Radu Sion, Query execution assurance for outsourced databases very large data bases. pp. 601- 612 ,(2005)
Alin Deutsch, Yannis Papakonstantinou, Privacy in Database Publishing Database Theory - ICDT 2005. pp. 230- 245 ,(2004) , 10.1007/978-3-540-30570-5_16