LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Waichal, Saili; Bhandure, Madhulika; Meshram, B B; Waghmare, Umang (2013)
Publisher: Journal of Engineering Computers & Applied Sciences
Journal: Journal of Engineering Computers & Applied Sciences
Languages: English
Types: Article
Subjects: Computer Sciences, Database as a service, Fingerprinting, Histogram, Relational databases, Watermarking
Security of Data stored in a database is an important measure of trust when database as a service paradigm is considered. In todays internet based applications and online storage systems the database service providers should implement proper privacy measures and take stringent actions against attacks and secure customers valuable data. In this paper, we anticipate the present day situations and attacks and suggest watermarking as a solution to achieve security against forgery and theft of databases. We give a brief account of audio, video, text and image water marking techniques. We identify important attacks in this sector and study their modus operandi. Our study also gives a survey about some of the past work and robust watermarking algorithms for relational databases and their advantages. Considering the present day importance of security we propose a two tier model for watermarking of databases. The two tier model watermarks a database as a whole along with the individual data objects stored in it.
  • No references.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article