Abstract
The value of massive data, e.g., customer service logs, is growing. Customer service log records are used to analyze market trends and diagnose service outage or performance degradation. Doing so, the data owner shares the log records with trusted third parties. The party, however, may violate the contract and illegally share with other non-trusted parties. To address this misbehavior, we propose a mask-based watermarking on the customer telecommunication log records. The watermark is added to the original data and later used to discover which party the owner shares the data. We analyze the utility of the watermarked data after applying our algorithm and also demonstrate that our algorithms are resilient against various attacks via risk analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agrawal, R., Haas, P., Kiernan, J.: Watermarking relational data: framework, algorithms and analysis. The VLDB Journal 12(2), 157–169 (2003)
Pournaghshband, V.: A New Watermarking Approach for Relational Data. In: ACM-SE 2008. ACM (2008) ISBN 978-1-60558-105-7/08/03
Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13, 422–426 (1970)
Sion, R.: Proving Ownership over Categorical Data. In: 20th ICDE, pp. 584–595 (2004)
Halder, R., Pal, S., Cortesi, A.: Watermarking Techniques for Relational Databases: Survery, Classification and Comparison. JUCS 16(21), 3164–3190 (2010)
Li, T.: On the Tradeoff Between Privacy and Utility in Data Publishing. In: 15th ACM International Conference on Knowledge Discovery and Data Mining, pp. 517–552 (2009)
Brickell, J., Shmatikov, V.: The Cost of Privacy: Destruction of Data-Mining Utility in Anonymized Data Publishing. In: 14th ACM SIGKDD, pp. 70–78 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Choi, H., Reuther, P. (2012). Fingerprinting Data Based on Secret Mask. In: Park, J., Kim, J., Zou, D., Lee, Y. (eds) Information Technology Convergence, Secure and Trust Computing, and Data Management. Lecture Notes in Electrical Engineering, vol 180. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5083-8_20
Download citation
DOI: https://doi.org/10.1007/978-94-007-5083-8_20
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5082-1
Online ISBN: 978-94-007-5083-8
eBook Packages: EngineeringEngineering (R0)