Title: Robust fingerprinting codes for database using non-adaptive group testing
Authors: Thach V. Bui; Binh Q. Nguyen; Thuc D. Nguyen; Noboru Sonehara; Isao Echizen
Addresses: Department of Multidisciplinary Sciences, School of Informatics, The Graduate University for Advanced Studies (SOKENDAI), 1560-35 Kamiyamaguchi, Hayama, Miura District, Kanagawa Prefecture 240-0115, Japan ' Faculty of Information Technology, Ho Chi Minh City University of Science, 227 Nguyen Van Cu, Ward 4, District 5, Ho Chi Minh City, Vietnam ' Faculty of Information Technology, Ho Chi Minh City University of Science, 227 Nguyen Van Cu, Ward 4, District 5, Ho Chi Minh City, Vietnam ' Department of Multidisciplinary Sciences, School of Informatics, The Graduate University for Advanced Studies (SOKENDAI), National Institute of Informatics, 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo, 101-8430 Japan ' Department of Multidisciplinary Sciences, School of Informatics, The Graduate University for Advanced Studies (SOKENDAI), National Institute of Informatics, 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo, 101-8430 Japan
Abstract: The purchasing of customer databases, which is becoming more and more common, has led to a big problem: illegal distribution of purchased databases. An essential tool for identifying distributors is database fingerprinting. There are two basic problem in fingerprinting database: designing the fingerprint and embedding it. For the first problem, we have proven that non-adaptive group testing, which is used to identify specific items in a large population, can be used for fingerprinting and that it is secure against collusion attack efficiently. For the second problem, we have developed a solution that supports up to 262,144 fingerprints for 4,032 attributes, and that is secure against three types of attacks: attribute, collusion and complimentary. Moreover, illegal distributor can be identified within 0.15 seconds.
Keywords: database distribution; fingerprinting codes; group testing; error correcting codes; ECCs; big data; customer databases; database fingerprinting; database purchasing; collusion attacks; database security; attribute attacks; complimentary attacks; illegal distributors.
DOI: 10.1504/IJBDI.2015.069095
International Journal of Big Data Intelligence, 2015 Vol.2 No.2, pp.81 - 90
Received: 22 Sep 2014
Accepted: 29 Dec 2014
Published online: 09 May 2015 *