Towards Robust Fingerprinting of Relational Databases by Mitigating Correlation Attacks

被引:0
|
作者
Ji, Tianxi [1 ]
Ayday, Erman [2 ]
Yilmaz, Emre [3 ]
Li, Pan [4 ]
机构
[1] Texas Tech Univ, Dept Comp Sci, Lubbock, TX 79409 USA
[2] Case Western Reserve Univ, Dept Comp & Data Sci, Cleveland, OH 44106 USA
[3] Univ Houston Downtown, Dept Comp Sci & Engn Technol, Houston, TX 77002 USA
[4] Case Western Reserve Univ, Dept Elect Comp & Syst Engn, Cleveland, OH 44106 USA
基金
美国国家科学基金会; 美国国家卫生研究院;
关键词
Robust fingerprinting; relational databases; correlation attacks; privacy; data sharing; WATERMARKING; MODEL;
D O I
10.1109/TDSC.2022.3191117
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Database fingerprinting is widely adopted to prevent unauthorized data sharing and identify the source of data leakages. Although existing schemes are robust against common attacks, their robustness degrades significantly if attackers utilize inherent correlations among database entries. In this paper, we demonstrate the vulnerability of existing schemes by identifying different correlation attacks: column-wise correlation attack, row-wise correlation attack, and their integration. We provide robust fingerprinting against these attacks by developing mitigation techniques, which can work as post-processing steps for any off-the-shelf database fingerprinting schemes and preserve the utility of databases. We investigate the impact of correlation attacks and the performance of mitigation techniques using a real-world database. Our results show (i) high success rates of correlation attacks against existing fingerprinting schemes (e.g., integrated correlation attack can distort 64.8% fingerprint bits by just modifying 14.2% entries in a fingerprinted database), and (ii) high robustness of mitigation techniques (e.g., after mitigation, integrated correlation attack can only distort 3% fingerprint bits). Additionally, the mitigation techniques effectively alleviate correlation attacks even if (i) attackers have access to correlation models directly computed from the original database, while the database owner uses inaccurate correlation models, (ii) or attackers utilize higher order of correlations than the database owner.
引用
收藏
页码:2939 / 2953
页数:15
相关论文
共 50 条
  • [1] Weighted algorithm for fingerprinting relational databases
    Cui, Xinchun
    Qin, Xiaolin
    Guan, Zhijin
    Shu, Yu
    [J]. Transactions of Nanjing University of Aeronautics and Astronautics, 2008, 25 (02) : 148 - 154
  • [2] Fingerprinting relational databases: Schemes and specialties
    Li, YJ
    Swarup, V
    Jajodia, S
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (01) : 34 - 45
  • [3] Robust fingerprinting of genomic databases
    Ji, Tianxi
    Ayday, Erman
    Yilmaz, Emre
    Li, Pan
    [J]. BIOINFORMATICS, 2022, 38 (SUPPL 1) : 143 - 152
  • [4] Fingerprinting of Relational Databases for Stopping the Data Theft
    Al Solami, Eesa
    Kamran, Muhammad
    Alkatheiri, Mohammed Saeed
    Rafiq, Fouzia
    Alghamdi, Ahmed S.
    [J]. ELECTRONICS, 2020, 9 (07): : 1 - 20
  • [5] Mitigating insider threat in cloud relational databases
    Yaseen, Qussai
    Althebyan, Qutaibah
    Panda, Brajendra
    Jararweh, Yaser
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) : 1132 - 1145
  • [6] A Digital Fingerprinting Approach for Relational Databases Copyright Protection
    Huang Qi-chun
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE OF MANAGEMENT SCIENCE AND INFORMATION SYSTEM, VOLS 1-4, 2009, : 192 - 197
  • [7] A Fingerprinting Technique for Numeric Relational Databases with Distortion Minimization
    Mohanpurkar, Arti
    Joshi, Madhuri
    [J]. 1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 655 - 660
  • [8] Towards semantic integrity in relational databases
    Botha, RA
    [J]. SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 287 - 297
  • [9] A robust algorithm for watermark numeric relational databases
    Cui, Xinchun
    Qin, Xiaolin
    Sheng, Gang
    Zheng, Jiping
    [J]. INTELLIGENT CONTROL AND AUTOMATION, 2006, 344 : 810 - 815
  • [10] Towards the reverse engineering of denormalized relational databases
    Petit, JM
    Toumani, F
    Boulicaut, JF
    Kouloumdjian, J
    [J]. PROCEEDINGS OF THE TWELFTH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, 1996, : 218 - 227