Robust relational database watermarking techniques aim to preserve the watermark in the protected assets despite daily updates and malicious attacks. Nevertheless, most techniques do not analyze the root of operations that can degrade the embedded watermark signal, being that the case of Structured Query Language (SQL) queries for relational data. In this paper, we perform an empirical analysis of the role played by different types of SQL queries in the persistence and degradation of a watermark signal in a relational data set. According to the type of operation, we present a set of alternatives for the watermark detection process, contributing to the extraction of an ownership copyright signals threshold. Moreover, our proposal allows data owners to consider variations for the selected watermarking technique, according to the suspected malicious operation performed in the copy of available data. Finally, we give evidence of the importance of some features to be considered when selecting a watermark source, making possible the resilience against update operations that affect a high amount of protected data and the enhancement of a partially detected watermark.

Empirical analysis of the impact of queries on watermarked relational databases

Olliaro M.;Perez Gort M. L.;Cortesi A.
2022-01-01

Abstract

Robust relational database watermarking techniques aim to preserve the watermark in the protected assets despite daily updates and malicious attacks. Nevertheless, most techniques do not analyze the root of operations that can degrade the embedded watermark signal, being that the case of Structured Query Language (SQL) queries for relational data. In this paper, we perform an empirical analysis of the role played by different types of SQL queries in the persistence and degradation of a watermark signal in a relational data set. According to the type of operation, we present a set of alternatives for the watermark detection process, contributing to the extraction of an ownership copyright signals threshold. Moreover, our proposal allows data owners to consider variations for the selected watermarking technique, according to the suspected malicious operation performed in the copy of available data. Finally, we give evidence of the importance of some features to be considered when selecting a watermark source, making possible the resilience against update operations that affect a high amount of protected data and the enhancement of a partially detected watermark.
File in questo prodotto:
File Dimensione Formato  
ESWA_Vir2em_2022a.pdf

non disponibili

Tipologia: Versione dell'editore
Licenza: Accesso chiuso-personale
Dimensione 5.44 MB
Formato Adobe PDF
5.44 MB Adobe PDF   Visualizza/Apri

I documenti in ARCA sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10278/5017244
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? 1
social impact