İlişkisel veri tabanlarında XML veriler için Homoglif dönüşüm tabanlı damgalama
Yıl 2019,
Cilt: 25 Sayı: 5, 586 - 595, 21.10.2019
Mustafa Bilgehan İmamoğlu
,
Mustafa Ulutaş
Öz
Bilgi Teknolojilerindeki
hızlı gelişim son zamanlarda İnternet üzerinden veri paylaşımını
kolaylaştırmıştır. Dijital verilerin izinsiz olarak kopyalanması veya
değiştirilmesi telif hakkı koruma sorununu beraberinde getirmiştir. Kriptografi
hassas bilgileri güvenli bir şekilde paylaşmak için kullanılsa bile şifrelenmiş
bilgiler orijinal veri ile ilişkilendirilemediğinden telif hakkı koruma
sürecinde kullanılamazlar. Dijital haklar yönetiminde son zamanlarda sayısal
damgalama yöntemleri kullanılmaktadır. Özel hazırlanmış gizli bilgileri veya
damgayı sayısal ortama gizleme yöntemleri verilerin korunmasında ve sahiplik
bilgilerinin belirlenmesinde ek güvenlik mekanizması sağlamaktadırlar. Çoklu
ortam dosyalarındaki hak yönetimi için önerilen algoritmalar, veri tabanları
üzerinde doğrudan uygulanamamaktadır. Veri tabanı damgalama için kullanılan
yöntemlerden bazıları, ilişkide yer alan XML veri alanlarından
faydalanmaktadır. Bu çalışmada XML alanlar üzerinde Homoglif Dönüşüm tabanlı
yeni bir algoritma önerilmektedir. Birincil anahtar ve özüt fonksiyonu veri tabanında
damgalanacak satırların seçiminde kullanılmıştır. Sonuçlar, önerilen yöntemin
literatürdeki diğer yöntemlerle karşılaştırıldığında yüksek damgalama
kapasitesinde çeşitli ataklara karşı iyileştirilmiş sağlamlık elde ettiğini
göstermektedir.
Kaynakça
- Agrawal R, Haas PJ, Kiernan J. “Watermarking relational data: framework, algorithms and analysis”. The International Journal on Very Large Data Bases, 12(2), 157-169, 2003.
- Gupta G, Pieprzyk J. “Database relation watermarking resilient against secondary watermarking attacks”. 5th International Conference on Information Systems Security, Kolkata, India, 14-18 December 2009.
- Zhang Y, Niu X, Zhao D. “A method of protecting relational databases copyright with cloud watermark”. International Journal of Information and Communication Engineering, 1, 337-341, 2005.
- Guo F, Wang J, Zhang Z, Ye X, Li D. “An improved algorithm to watermark numeric relational data”. 6th International Workshop on Information Security Applications, Jeju Island, Republic of Korea, 22-24 August 2005.
- Huang M, Cao J, Peng Z, Fang Y. “A new watermark mechanism for relational data”. 4th International Conference on Computer and Information Technology, Wuhan, China, 16 September 2004.
- Hu T, Chen G, Chen K, Dong J. “Garwm: towards a generalized and adaptive watermark scheme for relational data”. 6th International Conference in Advances in Web-Age Information Management, Hangzhou, China, 11-13 October 2005.
- Sion R. “Proving ownership over categorical data”. 20th International Conference on Data Engineering, Mass, USA, 30 March-2 April 2004.
- Sion R, Atallah M, Prabhakar S. “Rights protection for categorical data”. IEEE Transactions on Knowledge and Data Engineering, 17(7), 912-926, 2005.
- Wang C, Wang J, Zhou M, Chen G, Li D. “Atbam: an arnold transform based method on watermarking relational data”. International Conference on Multimedia and Ubiquitous Engineering, Beijing, China, 24-26 April 2008.
- Zhou X, Huang M, Peng Z. “An additive-attack-proof watermarking mechanism for databases copyrights protection using image”. ACM Symposium on Applied Computing, Seoul, Republic of Korea, 11-15 March 2007.
- Al-Haj A, Odeh A. “Robust and blind watermarking of relational database systems”. Journal of Computer Science, 4(12), 1024-1029, 2008.
- Wang H, Cui X, Cao Z. “A speech based algorithm for watermarking relational databases”. International Symposiums on Information Processing, Moscow, Russia, 23-25 May 2008.
- Li Y, Guo H, Jajodia S. “Tamper detection and localization for categorical data using fragile watermarks”. 4th ACM Workshop on Digital Rights Management, Washington, DC, USA, 25 October 2004.
- Kamel I. “A schema for protecting the integrity of databases”. Computers and Security, 28(7), 698-709, 2009.
- Khataeimaragheh H, Rashidi H. “A novel watermarking scheme for detecting and recovering distortions in database tables”. International Journal of Database Management Systems, 2(3), 1-11, 2010.
- Hamadou A, Sun X, Gao L, Shah SA. “A fragile zero-watermarking technique for authentication of relational databases”. International Journal of Digital Content Technology and its Applications, 5(5), 189-200, 2011.
- Rizzo SG, Bertini F, Montesi D. “Content-preserving Text watermarking through unicode homoglyph substitution”. 20th International Database Engineering & Applications Symposium, Montreal, Canada, 11-13 July 2016
- The Unicode Consortium. “Unicode Security Mechanisms for UTR”. http://www.unicode.org/Public/security/10.0.0/confusables.txt (20.06.2018).
- Guo F, Wang J, Zhang Z, Li D. “A new scheme to fingerprint XML data”. International Workshop on Knowledge Discovery from XML Documents, 9 April 2006.
- Inoue S, Makino K, Murase I, Takizawa O, Matsumoto T, Nakagawa H. “A proposal on information hiding methods using XML”. First NLP and XML Workshop, Tokyo, Japan, 30 November 2001.
- Wilfred Ng, Ho-Lam L. “Effective approaches for watermarking XML data”. International Symposium on Database Systems for Advanced Applications, Beijing, China, 17-20 April 2005.
- Fellbaum C. WordNet: An Electronic Lexical Database. Cambridge, Massachusetts, The MIT Press, 1998.
- Wen Q, Wang Y, Li P. “Two zero-watermark methods for XML documents”. Journal of Real-Time Image Processing, 14(1), 183-192, 2016.
- Saad M. “An optimized fingerprinting system for tamper proof and copy control of XML documents”. International Conference of Soft Computing and Pattern Recognition, Paris, France, 7-10 December 2010.
- Saad M. “New system to fingerprint extensible markup language documents using winnowing theory”. The Institution of Engineering and Technology Signal Processing, 6(4), 348-357, 2012.
- Ronghua Y, Qijun Z, Hongtao L. "A novel watermark algorithm for integrity protection of XML documents". International Journal of Computer Science and Network Security, 6(2), 202-207, 2006.
- Tchokpon R, Nadia B. “Robust XML watermarking using fuzzy queries”. Institute of Electrical and Electronics Engineers 36th International Conference on Computer Software and Applications Workshops, 16-20 July 2012.
Homoglyph transformation based watermarking for XML data in relational databases
Yıl 2019,
Cilt: 25 Sayı: 5, 586 - 595, 21.10.2019
Mustafa Bilgehan İmamoğlu
,
Mustafa Ulutaş
Öz
Rapid developments in
Information Technologies have eased data sharing through the Internet recently.
Copying or modification of digital data without permission and sharing by
unauthorized users have brought copyright protection problem. Even though
cryptography can be used to share sensitive information securely, it cannot be
used to protect copyright since encrypted information cannot be associated with
the original. Digital watermarking methods are used lately in digital rights
management. Methods to hide specially crafted secret information or watermark
into digital media provide additional security mechanism in protecting the data
and determining the ownership information. Algorithms recommended for right
management in multimedia files cannot be applied directly on databases. Some
methods used for watermarking databases take advantage of Extensible Markup
Language (XML) data fields attached. A new method based on Homoglyph
Transformation in XML fields is proposed in this manuscript. Primary key and
hash algorithm are used together in the selection of lines to be watermarked in
the database. Results indicate improved robustness against various attacks in
high watermarking capacity by the proposed method compared to other methods
reported in the literature.
Kaynakça
- Agrawal R, Haas PJ, Kiernan J. “Watermarking relational data: framework, algorithms and analysis”. The International Journal on Very Large Data Bases, 12(2), 157-169, 2003.
- Gupta G, Pieprzyk J. “Database relation watermarking resilient against secondary watermarking attacks”. 5th International Conference on Information Systems Security, Kolkata, India, 14-18 December 2009.
- Zhang Y, Niu X, Zhao D. “A method of protecting relational databases copyright with cloud watermark”. International Journal of Information and Communication Engineering, 1, 337-341, 2005.
- Guo F, Wang J, Zhang Z, Ye X, Li D. “An improved algorithm to watermark numeric relational data”. 6th International Workshop on Information Security Applications, Jeju Island, Republic of Korea, 22-24 August 2005.
- Huang M, Cao J, Peng Z, Fang Y. “A new watermark mechanism for relational data”. 4th International Conference on Computer and Information Technology, Wuhan, China, 16 September 2004.
- Hu T, Chen G, Chen K, Dong J. “Garwm: towards a generalized and adaptive watermark scheme for relational data”. 6th International Conference in Advances in Web-Age Information Management, Hangzhou, China, 11-13 October 2005.
- Sion R. “Proving ownership over categorical data”. 20th International Conference on Data Engineering, Mass, USA, 30 March-2 April 2004.
- Sion R, Atallah M, Prabhakar S. “Rights protection for categorical data”. IEEE Transactions on Knowledge and Data Engineering, 17(7), 912-926, 2005.
- Wang C, Wang J, Zhou M, Chen G, Li D. “Atbam: an arnold transform based method on watermarking relational data”. International Conference on Multimedia and Ubiquitous Engineering, Beijing, China, 24-26 April 2008.
- Zhou X, Huang M, Peng Z. “An additive-attack-proof watermarking mechanism for databases copyrights protection using image”. ACM Symposium on Applied Computing, Seoul, Republic of Korea, 11-15 March 2007.
- Al-Haj A, Odeh A. “Robust and blind watermarking of relational database systems”. Journal of Computer Science, 4(12), 1024-1029, 2008.
- Wang H, Cui X, Cao Z. “A speech based algorithm for watermarking relational databases”. International Symposiums on Information Processing, Moscow, Russia, 23-25 May 2008.
- Li Y, Guo H, Jajodia S. “Tamper detection and localization for categorical data using fragile watermarks”. 4th ACM Workshop on Digital Rights Management, Washington, DC, USA, 25 October 2004.
- Kamel I. “A schema for protecting the integrity of databases”. Computers and Security, 28(7), 698-709, 2009.
- Khataeimaragheh H, Rashidi H. “A novel watermarking scheme for detecting and recovering distortions in database tables”. International Journal of Database Management Systems, 2(3), 1-11, 2010.
- Hamadou A, Sun X, Gao L, Shah SA. “A fragile zero-watermarking technique for authentication of relational databases”. International Journal of Digital Content Technology and its Applications, 5(5), 189-200, 2011.
- Rizzo SG, Bertini F, Montesi D. “Content-preserving Text watermarking through unicode homoglyph substitution”. 20th International Database Engineering & Applications Symposium, Montreal, Canada, 11-13 July 2016
- The Unicode Consortium. “Unicode Security Mechanisms for UTR”. http://www.unicode.org/Public/security/10.0.0/confusables.txt (20.06.2018).
- Guo F, Wang J, Zhang Z, Li D. “A new scheme to fingerprint XML data”. International Workshop on Knowledge Discovery from XML Documents, 9 April 2006.
- Inoue S, Makino K, Murase I, Takizawa O, Matsumoto T, Nakagawa H. “A proposal on information hiding methods using XML”. First NLP and XML Workshop, Tokyo, Japan, 30 November 2001.
- Wilfred Ng, Ho-Lam L. “Effective approaches for watermarking XML data”. International Symposium on Database Systems for Advanced Applications, Beijing, China, 17-20 April 2005.
- Fellbaum C. WordNet: An Electronic Lexical Database. Cambridge, Massachusetts, The MIT Press, 1998.
- Wen Q, Wang Y, Li P. “Two zero-watermark methods for XML documents”. Journal of Real-Time Image Processing, 14(1), 183-192, 2016.
- Saad M. “An optimized fingerprinting system for tamper proof and copy control of XML documents”. International Conference of Soft Computing and Pattern Recognition, Paris, France, 7-10 December 2010.
- Saad M. “New system to fingerprint extensible markup language documents using winnowing theory”. The Institution of Engineering and Technology Signal Processing, 6(4), 348-357, 2012.
- Ronghua Y, Qijun Z, Hongtao L. "A novel watermark algorithm for integrity protection of XML documents". International Journal of Computer Science and Network Security, 6(2), 202-207, 2006.
- Tchokpon R, Nadia B. “Robust XML watermarking using fuzzy queries”. Institute of Electrical and Electronics Engineers 36th International Conference on Computer Software and Applications Workshops, 16-20 July 2012.