Reference Hub16
A Traitor Identification Technique for Numeric Relational Databases with Distortion Minimization and Collusion Avoidance

A Traitor Identification Technique for Numeric Relational Databases with Distortion Minimization and Collusion Avoidance

Arti Arun Mohanpurkar, Madhuri Satish Joshi
Copyright: © 2016 |Volume: 7 |Issue: 2 |Pages: 24
ISSN: 1941-6237|EISSN: 1941-6245|EISBN13: 9781466690172|DOI: 10.4018/IJACI.2016070106
Cite Article Cite Article

MLA

Mohanpurkar, Arti Arun, and Madhuri Satish Joshi. "A Traitor Identification Technique for Numeric Relational Databases with Distortion Minimization and Collusion Avoidance." IJACI vol.7, no.2 2016: pp.114-137. http://doi.org/10.4018/IJACI.2016070106

APA

Mohanpurkar, A. A. & Joshi, M. S. (2016). A Traitor Identification Technique for Numeric Relational Databases with Distortion Minimization and Collusion Avoidance. International Journal of Ambient Computing and Intelligence (IJACI), 7(2), 114-137. http://doi.org/10.4018/IJACI.2016070106

Chicago

Mohanpurkar, Arti Arun, and Madhuri Satish Joshi. "A Traitor Identification Technique for Numeric Relational Databases with Distortion Minimization and Collusion Avoidance," International Journal of Ambient Computing and Intelligence (IJACI) 7, no.2: 114-137. http://doi.org/10.4018/IJACI.2016070106

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

An enormous growth in internet usage has resulted into great amounts of digital data to handle. Data sharing has become significant and unavoidable. Data owners want the data to be secured and perennially available. Data protection and any violations thereby become crucial. This work proposes a traitor identification system which securely embeds the fingerprint to provide protection for numeric relational databases. Digital data of numeric nature calls for preservation of usability. It needs to be done so by achieving minimum distortion. The proposed insertion technique with reduced time complexity ensures that the fingerprint inserted in the form of an optimized error leads to minimum distortion. Collusion attack is an integral part of fingerprinting and a provision to mitigate by avoiding the same is suggested. Robustness of the system against several attacks like tuple insertion, tuple deletion etc. is also depicted.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.