DocumentCode :
3136004
Title :
Effective Fingerprinting Codes for Database
Author :
Bui, Thach V. ; Nguyen, Binh Q. ; Nguyen, T.D. ; Sonehara, Noboru ; Echizen, Isao
Author_Institution :
Fac. of Inf. Technol., Univ. of Sci., Ho Chi Minh City, Vietnam
fYear :
2013
fDate :
2-5 Dec. 2013
Firstpage :
655
Lastpage :
659
Abstract :
Though customer databases are so important, they can be sold under 95/46/EC and Data Protection Act law. This is a potential business. However, this business are encountering a big problem that purchaser wants to illegally distribute his database. We call them attacker. Attacker can use many schemes such as attribute, collusion and complimentary attack to achieve his goal. We have improved the technique of Thach V. Bui et. al., in which fingerprints are embedded into columns by anonymizing specific columns so that it is effective against attribute and collusion attacks. We have also proved that d-disjunct matrices are effective fingerprinting codes.
Keywords :
data privacy; database management systems; matrix algebra; security of data; Data Protection Act law; EU 95/46/EC data protection directive; attribute attack; collusion attack; column anonymization; complimentary attack; customer database; d-disjunct matrices; fingerprint embedding; fingerprinting codes; illegal database distribution; Business; Databases; Decoding; Educational institutions; Fingerprint recognition; Testing; Vectors; Database Distribution; Fingerprinting Code; Group Testing; List Decoding;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Signal-Image Technology & Internet-Based Systems (SITIS), 2013 International Conference on
Conference_Location :
Kyoto
Type :
conf
DOI :
10.1109/SITIS.2013.107
Filename :
6727257
Link To Document :
بازگشت