Resilient Rights Protection for Sensor Streams
نویسندگان
چکیده
Today’s world of increasingly dynamic computing environments naturally results in more and more data being available as fast streams. Applications such as stock market analysis, environmental sensing, web clicks and intrusion detection are just a few of the examples where valuable data is streamed. Often, streaming information is offered on the basis of a non-exclusive, single-use customer license. One major concern, especially given the digital nature of the valuable stream, is the ability to easily record and potentially “re-play” parts of it in the future. If there is value associated with such future re-plays, it could constitute enough incentive for a malicious customer (Mallory) to duplicate segments of such recorded data, subsequently re-selling them for profit. Being able to protect against such infringements becomes a necessity. In this paper we introduce the issue of rights protection for discrete streaming data through watermarking. This is a novel problem with many associated challenges including: operating in a finite window, single-pass, (possibly) high-speed streaming model, surviving natural domain specific transforms and attacks (e.g.extreme sparse sampling and summarizations), while at the same time keeping data alterations within allowable bounds. We proPortions of this work were supported by Grants EIA9903545, IIS-0325345, IIS-0219560, IIS-0312357, IIS-9985019 and IIS-0242421 from the National Science Foundation, Contract N00014-02-1-0364 from the Office of Naval Research, by sponsors of the Purdue Center for Education and Research in Information Assurance and Security, and by Purdue Discovery Park’s e-enterprise Center. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the VLDB copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Very Large Data Base Endowment. To copy otherwise, or to republish, requires a fee and/or special permission from the Endowment. Proceedings of the 30th VLDB Conference, Toronto, Canada, 2004 pose a solution and analyze its resilience to various types of attacks as well as some of the important expected domain-specific transforms, such as sampling and summarization. We implement a proof of concept software (wms.*) and perform experiments on real sensor data from the NASA Infrared Telescope Facility at the University of Hawaii, to assess encoding resilience levels in practice. Our solution proves to be well suited for this new domain. For example, we can recover an over 97% confidence watermark from a highly down-sampled (e.g. less than 8%) stream or survive stream summarization (e.g. 20%) and random alteration attacks with very high confidence levels, often above 99%.
منابع مشابه
CERIAS Tech Report 2004-39 RIGHTS ASSESSMENT FOR DISCRETE DIGITAL DATA
Sion, Radu. Ph.D., Purdue University, August, 2004. Rights Assessment for Discrete Digital Data. Major Professors: Mikhail Atallah and Sunil Prabhakar. Zero-cost verbatim digital copies, possibly one of the main features of the Information Age threatens to become one if its significant road-blocks, as more and more information is processed in fast, distributed environments. The ability to produ...
متن کاملRights Assessment for Discrete Digital Data
Sion, Radu. Ph.D., Purdue University, August, 2004. Rights Assessment for Discrete Digital Data. Major Professors: Mikhail Atallah and Sunil Prabhakar. Zero-cost verbatim digital copies, possibly one of the main features of the Information Age threatens to become one if its significant road-blocks, as more and more information is processed in fast, distributed environments. The ability to produ...
متن کاملWhat's Different: Distributed, Continuous Monitoring of Duplicate-Resilient Aggregates on Data Streams
Emerging applications in sensor systems and network-wide IP traffic analysis present many technical challenges. They need distributed monitoring and continuous tracking of events. They have severe resource constraints not only at each site in terms of per-update processing time and archival space for highspeed streams of observations, but also crucially, communication constraints for collaborat...
متن کاملResilient Remote Sensing:
This invited paper briefly describes our progress in developing a resilient multi-spectral image analysis capability for remote sensing applications. This capability is intended to allow image streams from a collection of distributed sensors to be disseminated and interpreted by a group of analysts, while under information warfare attack. There are five component technologies that we are develo...
متن کاملResilient Plant Monitoring Systems: Techniques, Analysis, Design, and Performance Evaluation
Resilient plant monitoring systems are sensor networks that degrade gracefully under malicious attacks on their sensors, causing them to project misleading information. This paper develops techniques to ensure resiliency and illustrates their application using a power plant. Specific techniques developed are: active data quality acquisition, process variable and plant condition assessments, sen...
متن کاملNecessity of Criminal Protection of Intellectual Property Rights with a View to its Moral Basis
Background: For several centuries, there has been a debate about the dimensions of intellectual property to support the thinkers of society and prevent their exploitation. Unfortunately, this invisible and powerful asset is increasingly vulnerable. Therefore, establishing favorable regulations, guaranteeing proper criminal enforcement and effective enforcement of laws in order to protect these ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004