DocumentCode
3136004
Title
Effective Fingerprinting Codes for Database
Author
Bui, Thach V. ; Nguyen, Binh Q. ; Nguyen, T.D. ; Sonehara, Noboru ; Echizen, Isao
Author_Institution
Fac. of Inf. Technol., Univ. of Sci., Ho Chi Minh City, Vietnam
fYear
2013
fDate
2-5 Dec. 2013
Firstpage
655
Lastpage
659
Abstract
Though customer databases are so important, they can be sold under 95/46/EC and Data Protection Act law. This is a potential business. However, this business are encountering a big problem that purchaser wants to illegally distribute his database. We call them attacker. Attacker can use many schemes such as attribute, collusion and complimentary attack to achieve his goal. We have improved the technique of Thach V. Bui et. al., in which fingerprints are embedded into columns by anonymizing specific columns so that it is effective against attribute and collusion attacks. We have also proved that d-disjunct matrices are effective fingerprinting codes.
Keywords
data privacy; database management systems; matrix algebra; security of data; Data Protection Act law; EU 95/46/EC data protection directive; attribute attack; collusion attack; column anonymization; complimentary attack; customer database; d-disjunct matrices; fingerprint embedding; fingerprinting codes; illegal database distribution; Business; Databases; Decoding; Educational institutions; Fingerprint recognition; Testing; Vectors; Database Distribution; Fingerprinting Code; Group Testing; List Decoding;
fLanguage
English
Publisher
ieee
Conference_Titel
Signal-Image Technology & Internet-Based Systems (SITIS), 2013 International Conference on
Conference_Location
Kyoto
Type
conf
DOI
10.1109/SITIS.2013.107
Filename
6727257
Link To Document