{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T16:10:03Z","timestamp":1751040603749,"version":"3.41.0"},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662562659"},{"type":"electronic","value":"9783662562666"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-662-56266-6_8","type":"book-chapter","created":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T17:35:08Z","timestamp":1511804108000},"page":"172-192","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Partitioning-Insensitive Watermarking Approach for Distributed Relational Databases"],"prefix":"10.1007","author":[{"given":"Sapana","family":"Rani","sequence":"first","affiliation":[]},{"given":"Dileep Kumar","family":"Koshley","sequence":"additional","affiliation":[]},{"given":"Raju","family":"Halder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,28]]},"reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-319-48057-2_12","volume-title":"Future Data and Security Engineering","author":"S Rani","year":"2016","unstructured":"Rani, S., Koshley, D.K., Halder, R.: A watermarking framework for outsourced and distributed relational databases. In: Dang, T.K., Wagner, R., K\u00fcng, J., Thoai, N., Takizawa, M., Neuhold, E. (eds.) FDSE 2016. LNCS, vol. 10018, pp. 175\u2013188. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-48057-2_12"},{"key":"8_CR2","volume-title":"Principles of Distributed Database Systems","author":"MT \u00d6zsu","year":"2011","unstructured":"\u00d6zsu, M.T., Valduriez, P.: Principles of Distributed Database Systems. Springer, New York (2011)"},{"key":"8_CR3","unstructured":"Amazon Relational Database Service. https:\/\/aws.amazon.com\/rds\/"},{"key":"8_CR4","unstructured":"Microsoft Azure SQL Database. https:\/\/azure.microsoft.com\/en-in\/services\/sql-database\/"},{"key":"8_CR5","unstructured":"Curino, C., Jones, E.P., Popa, R.A., Malviya, N., Wu, E., Madden, S., Balakrishnan, H., Zeldovich, N.: Relational cloud: A database-as-a-service for the cloud (2011)"},{"issue":"21","key":"8_CR6","first-page":"3164","volume":"16","author":"R Halder","year":"2010","unstructured":"Halder, R., Pal, S., Cortesi, A.: Watermarking techniques for relational databases: Survey, classification and comparison. J. UCS 16(21), 3164\u20133190 (2010)","journal-title":"J. UCS"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-642-10772-6_19","volume-title":"Information Systems Security","author":"S Bhattacharya","year":"2009","unstructured":"Bhattacharya, S., Cortesi, A.: A generic distortion free watermarking technique for relational databases. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 252\u2013264. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10772-6_19"},{"key":"8_CR8","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-81-322-2653-6_11","volume-title":"Advanced Computing and Systems for Security","author":"S Rani","year":"2016","unstructured":"Rani, S., Kachhap, P., Halder, R.: Data-flow analysis-based approach of database watermarking. In: Chaki, R., Cortesi, A., Saeed, K., Chaki, N. (eds.) Advanced Computing and Systems for Security. AISC, vol. 396, pp. 153\u2013171. Springer, New Delhi (2016). https:\/\/doi.org\/10.1007\/978-81-322-2653-6_11"},{"issue":"2","key":"8_CR9","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s00778-003-0097-x","volume":"12","author":"R Agrawal","year":"2003","unstructured":"Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking relational data: framework, algorithms and analysis. VLDB J. 12(2), 157\u2013169 (2003)","journal-title":"VLDB J."},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-10772-6_17","volume-title":"Information Systems Security","author":"G Gupta","year":"2009","unstructured":"Gupta, G., Pieprzyk, J.: Database relation watermarking resilient against secondary watermarking attacks. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 222\u2013236. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10772-6_17"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Zhou, X., Huang, M., Peng, Z.: An additive-attack-proof watermarking mechanism for databases\u2019 copyrights protection using image. In: Proceedings of the 2007 ACM Symposium on Applied Computing, pp. 254\u2013258. ACM (2007)","DOI":"10.1145\/1244002.1244066"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-642-17714-9_16","volume-title":"Information Systems Security","author":"R Halder","year":"2010","unstructured":"Halder, R., Cortesi, A.: A persistent public watermarking of relational databases. In: Jha, S., Mathuria, A. (eds.) ICISS 2010. LNCS, vol. 6503, pp. 216\u2013230. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17714-9_16"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: Proceedings of the 4th ACM workshop on Digital rights management, pp. 73\u201382. ACM (2004)","DOI":"10.1145\/1029146.1029159"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Li, Y., Deng, R.H.: Publicly verifiable ownership protection for relational databases. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 78\u201389. ACM (2006)","DOI":"10.1145\/1128817.1128832"},{"key":"8_CR15","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-642-29578-2_13","volume-title":"Software and Data Technologies","author":"S Bhattacharya","year":"2013","unstructured":"Bhattacharya, S., Cortesi, A.: Distortion-free authentication watermarking. In: Cordeiro, J., Virvou, M., Shishkov, B. (eds.) ICSOFT 2010. CCIS, vol. 170, pp. 205\u2013219. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-29578-2_13"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Niu, X., Zhao, D., Li, J., Liu, S.: Relational databases watermark technique based on content characteristic. In: 2006 First International Conference on Innovative Computing, Information and Control, ICICIC 2006, vol. 3, pp. 677\u2013680. IEEE (2006)","DOI":"10.1109\/ICICIC.2006.503"},{"issue":"10","key":"8_CR17","doi-asserted-by":"crossref","first-page":"1350","DOI":"10.1016\/j.ins.2005.06.003","volume":"176","author":"H Guo","year":"2006","unstructured":"Guo, H., Li, Y., Liu, A., Jajodia, S.: A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. 176(10), 1350\u20131378 (2006)","journal-title":"Inf. Sci."},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Pournaghshband, V.: A new watermarking approach for relational data. In: Proceedings of the 46th Annual Southeast Regional Conference on XX, pp. 127\u2013131. ACM (2008)","DOI":"10.1145\/1593105.1593138"},{"issue":"12","key":"8_CR19","doi-asserted-by":"crossref","first-page":"2694","DOI":"10.1109\/TKDE.2012.227","volume":"25","author":"M Kamran","year":"2013","unstructured":"Kamran, M., Suhail, S., Farooq, M.: A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints. IEEE Trans. Knowl. Data Eng. 25(12), 2694\u20132707 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Bhattacharya, S., Cortesi, A.: A distortion free watermark framework for relational databases. In: ICSOFT, vol. 2, pp. 229\u2013234 (2009)","DOI":"10.5220\/0002256402290234"},{"key":"8_CR21","first-page":"1","volume":"2013","author":"A Khan","year":"2013","unstructured":"Khan, A., Husain, S.A.: A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations. Sci. World J. 2013, 1\u201316 (2013)","journal-title":"Sci. World J."},{"key":"8_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2014\/697165","volume":"2014","author":"L Camara","year":"2014","unstructured":"Camara, L., Li, J., Li, R., Xie, W.: Distortion-free watermarking approach for relational database integrity checking. Math. Probl. Eng. 2014, 1\u201310 (2014)","journal-title":"Math. Probl. Eng."},{"key":"8_CR23","series-title":"Advances in Intelligent and Soft Computing","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/978-3-642-16626-6_19","volume-title":"Computational Intelligence in Security for Information Systems","author":"H El-Bakry","year":"2010","unstructured":"El-Bakry, H., Hamada, M.: A developed watermark technique for distributed database security. In: Herrero, \u00c1., Corchado, E., Redondo, C., Alonso, \u00c1. (eds.) Computational Intelligence in Security for Information Systems. AISC, vol. 85, pp. 173\u2013180. Springer, Heidelberg (2010)"},{"key":"8_CR24","unstructured":"Razdan, R.: Real-time, distributed, transactional, hybrid watermarking method to provide traceability and copyright protection of digital content in peer-to-peer networks, 7 March 2001. US Patent App. 09\/799,509"},{"key":"8_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/3-540-39466-4_27","volume-title":"Cryptography","author":"M Mignotte","year":"1983","unstructured":"Mignotte, M.: How to share a secret. In: Beth, T. (ed.) EUROCRYPT 1982. LNCS, vol. 149, pp. 371\u2013375. Springer, Heidelberg (1983). https:\/\/doi.org\/10.1007\/3-540-39466-4_27"},{"key":"8_CR26","unstructured":"Khanna, S., Zane, F.: Watermarking maps: hiding information in structured data. In: Proceedings of the Eleventh Annual ACM-SIAM Symposium on Discrete Algorithms, Society for Industrial and Applied Mathematics, pp. 596\u2013605 (2000)"},{"issue":"6","key":"8_CR27","first-page":"1022","volume":"18","author":"MR Xie","year":"2016","unstructured":"Xie, M.R., Wu, C.C., Shen, J.J., Hwang, M.S.: A survey of data distortion watermarking relational databases. Int. J. Netw. Secur. 18(6), 1022\u20131033 (2016)","journal-title":"Int. J. Netw. Secur."},{"key":"8_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-319-09912-5_18","volume-title":"Active Media Technology","author":"V Khanduja","year":"2014","unstructured":"Khanduja, V., Chakraverty, S., Verma, O.P., Singh, N.: A scheme for robust biometric watermarking in web databases for ownership proof with identification. In: \u015al\u0229zak, D., Schaefer, G., Vuong, S.T., Kim, Y.-S. (eds.) AMT 2014. LNCS, vol. 8610, pp. 212\u2013225. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-09912-5_18"},{"issue":"3","key":"8_CR29","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1007\/s11042-013-1700-9","volume":"74","author":"V Khanduja","year":"2015","unstructured":"Khanduja, V., Verma, O.P., Chakraverty, S.: Watermarking relational databases using bacterial foraging algorithm. Multimed. Tools Appl. 74(3), 813\u2013839 (2015)","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"8_CR30","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1504\/IJBDI.2016.078410","volume":"3","author":"I Kamel","year":"2016","unstructured":"Kamel, I., AlaaEddin, M., Yaqub, W., Kamel, K.: Distortion-free fragile watermark for relational databases. Int. J. Big Data Intell. 3(3), 190\u2013201 (2016)","journal-title":"Int. J. Big Data Intell."},{"issue":"3","key":"8_CR31","first-page":"404","volume":"84","author":"AS Alfagi","year":"2016","unstructured":"Alfagi, A.S., Manaf, A.A., Hamida, B., Olanrewajub, R.: A zero-distortion fragile watermarking scheme to detect and localize malicious modifications in textual database relations. J. Theoret. Appl. Inf. Technol. 84(3), 404\u2013413 (2016)","journal-title":"J. Theoret. Appl. Inf. Technol."},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Rani, S., Koshley, D.K., Halder, R.: Adapting mapreduce for efficient watermarking of large relational dataset. In: Trustcom\/BigDataSE\/ICESS, 2017 IEEE, pp. 729\u2013736. IEEE (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.306"},{"issue":"1","key":"8_CR33","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: Mapreduce: simplified data processing on large clusters. Commun. ACM 51(1), 107\u2013113 (2008)","journal-title":"Commun. ACM"},{"key":"8_CR34","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragments and loose associations: Respecting privacy in data publishing. In: Proceedings of the VLDB Endowment, vol. 3(1\u20132), pp. 1370\u20131381 (2010)","DOI":"10.14778\/1920841.1921009"},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Narasayya, V., Yang, B.: Integrating vertical and horizontal partitioning into automated physical database design. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, pp. 359\u2013370. ACM (2004)","DOI":"10.1145\/1007568.1007609"},{"key":"8_CR36","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511810275","volume-title":"Logic in Computer Science: Modelling and Reasoning about Systems","author":"M Huth","year":"2004","unstructured":"Huth, M., Ryan, M.: Logic in Computer Science: Modelling and Reasoning about Systems. Cambridge University Press, Cambridge (2004)"},{"key":"8_CR37","doi-asserted-by":"crossref","unstructured":"Rodr\u00edguez, L., Li, X.: A dynamic vertical partitioning approach for distributed database system. In: 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1853\u20131858. IEEE (2011)","DOI":"10.1109\/ICSMC.2011.6083941"},{"issue":"11","key":"8_CR38","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"8_CR39","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.entcs.2007.01.065","volume":"186","author":"S Iftene","year":"2007","unstructured":"Iftene, S.: General secret sharing based on the chinese remainder theorem with applications in e-voting. Electron. Notes Theoret. Comput. Sci. 186, 67\u201384 (2007)","journal-title":"Electron. Notes Theoret. Comput. Sci."},{"key":"8_CR40","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B Schneier","year":"2007","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, New York (2007)"},{"key":"8_CR41","unstructured":"Rani, S., Kumar Koshley, D., Halder, R.: Partitioning-insensitive watermarking approach for distributed relational databases. Technical report, Department of Computer Science and Engineering, Indian Institute of Technology Patna (2017). http:\/\/www.iitp.ac.in\/~halder\/Papers\/TechReport\/DistributedRDBWatermark.pdf"}],"container-title":["Lecture Notes in Computer Science","Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-56266-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T15:31:38Z","timestamp":1751038298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-56266-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783662562659","9783662562666"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-56266-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}