A Correlation-Preserving Fingerprinting Technique for Categorical Data in Relational Databases

被引:0
作者
Sarcevic, Tanja [1 ]
Mayer, Rudolf [1 ]
机构
[1] SBA Res, Vienna, Austria
来源
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2020 | 2020年 / 580卷
基金
欧盟地平线“2020”;
关键词
Fingerprinting; Relational database; Categorical data; Data utility analysis; Robustness analysis;
D O I
10.1007/978-3-030-58201-2_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fingerprinting is a method of embedding a traceable mark into digital data, to verify the owner and identify the recipient a certain copy of a data set has been released to. This is crucial when releasing data to third parties, especially if it involves a fee, or if the data is of sensitive nature, due to which further sharing and leaks should be discouraged and deterred from. Fingerprinting and watermarking are well explored in the domain of multimedia content, such as images, video, or audio. The domain of relational databases is explored specifically for numerical data types, for which most state-of-art techniques are designed. However, many datasets also, or even exclusively, contain categorical data. We, therefore, propose a novel approach for fingerprinting categorical type of data, focusing on preserving the semantic relations between attributes, and thus limiting the perceptibility of marks, and the effects of the fingerprinting on the data quality and utility. We evaluate the utility, especially for machine learning tasks, as well as the robustness of the fingerprinting scheme, by experiments on benchmark data sets.
引用
收藏
页码:401 / 415
页数:15
相关论文
共 12 条
[1]   Why Johnny Doesn't Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key [J].
Das, Sanchari ;
Dingman, Andrew ;
Camp, L. Jean .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2018, 2018, 10957 :160-179
[2]  
Fei Guo, 2006, Applied Computing 2006. 21st Annual ACM Symposium on Applied Computing, P487
[3]   An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata [J].
Kieseberg, Peter ;
Schrittwieser, Sebastian ;
Mulazzani, Martin ;
Echizen, Isao ;
Weippl, Edgar .
ELECTRONIC MARKETS, 2014, 24 (02) :113-124
[4]   WATERMILL: An optimized fingerprinting system for databases under constraints [J].
Lafaye, Julien ;
Gross-Amblard, David ;
Constantin, Camelia ;
Guerrouani, Meryem .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2008, 20 (04) :532-546
[5]   Fingerprinting relational databases: Schemes and specialties [J].
Li, YJ ;
Swarup, V ;
Jajodia, S .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (01) :34-45
[6]  
Liu SY, 2004, LECT NOTES COMPUT SC, V3506, P455
[7]   An Evaluation on Robustness and Utility of Fingerprinting Schemes [J].
Sarcevic, Tanja ;
Mayer, Rudolf .
MACHINE LEARNING AND KNOWLEDGE EXTRACTION, CD-MAKE 2019, 2019, 11713 :209-228
[8]   Proving ownership over categorical data [J].
Sion, R .
20TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2004, :584-595
[9]   Rights protection for relational data [J].
Sion, R ;
Atallah, M ;
Prabhakar, S .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (12) :1509-1525
[10]   k-anonymity:: A model for protecting privacy [J].
Sweeney, L .
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) :557-570