Int. J. of Big Data Intelligence   »   2015 Vol.2, No.2

 

 

Title: Robust fingerprinting codes for database using non-adaptive group testing

 

Authors: Thach V. Bui; Binh Q. Nguyen; Thuc D. Nguyen; Noboru Sonehara; Isao Echizen

 

Addresses:
Department of Multidisciplinary Sciences, School of Informatics, The Graduate University for Advanced Studies (SOKENDAI), 1560-35 Kamiyamaguchi, Hayama, Miura District, Kanagawa Prefecture 240-0115, Japan
Faculty of Information Technology, Ho Chi Minh City University of Science, 227 Nguyen Van Cu, Ward 4, District 5, Ho Chi Minh City, Vietnam
Faculty of Information Technology, Ho Chi Minh City University of Science, 227 Nguyen Van Cu, Ward 4, District 5, Ho Chi Minh City, Vietnam
Department of Multidisciplinary Sciences, School of Informatics, The Graduate University for Advanced Studies (SOKENDAI), National Institute of Informatics, 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo, 101-8430 Japan
Department of Multidisciplinary Sciences, School of Informatics, The Graduate University for Advanced Studies (SOKENDAI), National Institute of Informatics, 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo, 101-8430 Japan

 

Abstract: The purchasing of customer databases, which is becoming more and more common, has led to a big problem: illegal distribution of purchased databases. An essential tool for identifying distributors is database fingerprinting. There are two basic problem in fingerprinting database: designing the fingerprint and embedding it. For the first problem, we have proven that non-adaptive group testing, which is used to identify specific items in a large population, can be used for fingerprinting and that it is secure against collusion attack efficiently. For the second problem, we have developed a solution that supports up to 262,144 fingerprints for 4,032 attributes, and that is secure against three types of attacks: attribute, collusion and complimentary. Moreover, illegal distributor can be identified within 0.15 seconds.

 

Keywords: database distribution; fingerprinting codes; group testing; error correcting codes; ECCs; big data; customer databases; database fingerprinting; database purchasing; collusion attacks; database security; attribute attacks; complimentary attacks; illegal distributors.

 

DOI: 10.1504/IJBDI.2015.069095

 

Int. J. of Big Data Intelligence, 2015 Vol.2, No.2, pp.81 - 90

 

Submission date: 16 Sep 2014
Date of acceptance: 29 Dec 2014
Available online: 26 Apr 2015

 

 

Editors Full text accessAccess for SubscribersPurchase this articleComment on this article