Full Text:   <1926>

Summary:  <1351>

CLC number: TP309

On-line Access: 2018-04-09

Received: 2016-08-17

Revision Accepted: 2017-02-14

Crosschecked: 2018-02-15

Cited: 0

Clicked: 6355

Citations:  Bibtex RefMan EndNote GB/T7714

 ORCID:

Muhammad Kamran

http://orcid.org/0000-0002-6639-5688

-   Go to

Article info.
Open peer comments

Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.2 P.151-164

http://doi.org/10.1631/FITEE.1601479


On the role of optimization algorithms in ownership-preserving data mining


Author(s):  Muhammad Kamran, Ehsan Ullah Munir

Affiliation(s):  Department of Computer Science, COMSATS Institute of Information Technology, Wah Cantt 47010, Pakistan

Corresponding email(s):   muhammad.kamran@ciitwah.edu.pk, ehsanmunir@comsats.edu.pk

Key Words:  Information security, Optimization, Digital rights, Watermarking


Share this article to: More |Next Article >>>

Muhammad Kamran, Ehsan Ullah Munir. On the role of optimization algorithms in ownership-preserving data mining[J]. Frontiers of Information Technology & Electronic Engineering, 2018, 19(2): 151-164.

@article{title="On the role of optimization algorithms in ownership-preserving data mining",
author="Muhammad Kamran, Ehsan Ullah Munir",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="19",
number="2",
pages="151-164",
year="2018",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.1601479"
}

%0 Journal Article
%T On the role of optimization algorithms in ownership-preserving data mining
%A Muhammad Kamran
%A Ehsan Ullah Munir
%J Frontiers of Information Technology & Electronic Engineering
%V 19
%N 2
%P 151-164
%@ 2095-9184
%D 2018
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.1601479

TY - JOUR
T1 - On the role of optimization algorithms in ownership-preserving data mining
A1 - Muhammad Kamran
A1 - Ehsan Ullah Munir
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 19
IS - 2
SP - 151
EP - 164
%@ 2095-9184
Y1 - 2018
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.1601479


Abstract: 
Knowledge extraction from sensitive data often needs collaborative work. Statistical databases are generated from such data and shared among various stakeholders. In this context, the ownership protection of shared data becomes important. watermarking is emerging to be a very effective tool for imposing ownership rights on various digital data formats. watermarking of such datasets may bring distortions in the data. Consequently, the extracted knowledge may be inaccurate. These distortions are controlled by the usability constraints, which in turn limit the available bandwidth for watermarking. Large bandwidth ensures robustness; however, it may degrade the quality of the data. Such a situation can be resolved by optimizing the available bandwidth subject to the usability constraints. optimization techniques, particularly bioinspired techniques, have become a preferred choice for solving such issues during the past few years. In this paper, we investigate the usability of various optimization schemes for identifying the maximum available bandwidth to achieve two objectives: (1) preserving the knowledge stored in the data; (2) maximizing the available bandwidth subject to the usability constraints to achieve maximum robustness. The first objective is achieved with a usability constraint model, which ensures that the knowledge is not compromised as a result of watermark embedding. The second objective is achieved by finding the maximum bandwidth subject to the usability constraints specified in the first objective. The performance of optimization schemes is evaluated using different metrics.

优化算法在所有权保留数据挖掘中的应用

概要:从敏感数据中提取知识往往需要协同工作。统计数据库根据这些敏感数据生成,并由各利益相关方共享。在此情况下,共享数据的所有权保护变得尤为重要。水印技术正逐渐成为一种推行数字数据格式所有权的有效工具,但该技术也可能导致数据失真。因此,从具有水印的数据中提取的知识可能不准确。数据失真程度由可用性约束条件来控制,这反过来又限制了可用于添加水印的带宽。尽管大带宽能保证鲁棒性,但可能降低数据质量。该问题可以通过在可用性约束条件下优化可用带宽来解决。如今,优化技术--尤其是生物启发式技术--已成为解决该类问题的首选。本文分析了多种优化方案及其可行性,用于优化添加水印的最大可用带宽,并期望达到以下两个目标:(1)保持数据中存储的知识不变;(2)在可用性约束条件下使可用带宽最大化,以取得最佳鲁棒性。第一个目标利用一个可用性约束模型实现,该模型能确保知识不会因嵌入水印而受到损害。第二个目标通过找到满足第一个目标的可用性约束条件下最大带宽实现。采用不同指标对多种优化方案性能进行了评估。

关键词:信息安全;优化技术;数字版权;水印技术

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1]Agrawal R, Kiernan J, 2002. Watermarking relational databases. Proc 28th Int Conf on Very Large Databases, p.155-166.

[2]Atallah MJ, Raskin V, Hempelmann CF, et al., 2002. Natural language watermarking and tamper-proofing. Int Workshop on Information Hiding, p.196-212.

[3]Bertino E, Ooi BC, Yang Y, et al., 2005. Privacy and ownership preserving of outsourced medical data. Proc 21st Int Conf on Data Engineering, p.521-532.

[4]Duran MA, Grossmann IE, 1986. An outer-approximation algorithm for a class of mixed-integer nonlinear programs. Math Programm, 36(3):307-339.

[5]Elbeltagi E, Hegazy T, Grierson D, 2005. Comparison among five evolutionary-based optimization algorithms. Adv Eng Inform, 19(1):43-53.

[6]Engelbrecht AP, 2007. Computational Intelligence: an Introduction (2nd Ed.). Wiley, New York.

[7]Franco-Contreras J, Coatrieux G, 2015. Robust watermarking of relational databases with ontology-guided distortion control. IEEE Trans Inform Forens Secur, 10(9):1939-1952.

[8]Franco-Contreras J, Coatrieux G, Cuppens F, et al., 2014. Robust lossless watermarking of relational databases based on circular histogram modulation. IEEE Trans Inform Forens Secur, 9(3):397-410.

[9]Grossmann IE, Kravanja Z, 1997. Mixed-integer nonlinear programming: a survey of algorithms and applications. In: Biegler LT, Coleman TF, Conn AR, et al. (Eds.), Large-Scale Optimization with Applications. Part II: Optimal Design and Control. Springer, New York, NY, p.73-100.

[10]Hartung F, Kutter M, 1999. Multimedia watermarking techniques. Proc IEEE, 87(7):1079-1107.

[11]Holland, JH, 1992. Adaptation in Natural and Artificial Systems: an Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence. MIT Press, Cambridge, MA.

[12]Iqbal S, Rauf A, Mahfooz S, et al., 2012. Self-constructing fragile watermark algorithm for relational database integrity proof. World Appl Sci J, 19(9):1273-1277.

[13]Kamran M, Farooq M, 2012. An information-preserving watermarking scheme for right protection of EMR systems. IEEE Trans Knowl Data Eng, 24(11):1950-1962.

[14]Kamran M, Farooq M, 2013. A formal usability constraints model for watermarking of outsourced datasets. IEEE Trans Inform Forens Secur, 8(6):1061-1072.

[15]Kamran M, Suhail S, Farooq M, 2013. A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints. IEEE Trans Knowl Data Eng, 25(12):2694-2707.

[16]Kennedy J, Eberhart R, 1995. Particle swarm optimization. Proc IEEE Int Conf on Neural Networks, p.1942-1948.

[17]Khanduja V, Verma OP, 2012. Identification and proof of ownership by watermarking relational databases. Int J Inform Electron Eng, 2(2):274-277.

[18]Khanduja V, Chakraverty S, Verma OP, 2015. Watermarking categorical data: algorithm and robustness analysis. Def Sci J, 65(3):226-232.

[19]Rani S, Kachhap P, Haider R, 2016. Dataflow analysis-based approach of database watermarking. In: Chaki R, Cortesi A, Saeed K (Eds.), Advanced Computing and Systems for Security, Volume 2. Springer, New Delhi, p.153-171.

[20]Rao UP, Patel DR, Vikani PM, 2012. Relational database watermarking for ownership protection. Proc Technol, 6:988-995.

[21]Schrage LE, 1991. LINDO: an Optimization Modeling System (4th Ed.). Scientific Press, South San Francisco, CA.

[22]Shehab M, Bertino E, Ghafoor A, 2008. Watermarking relational databases using optimization-based techniques. IEEE Trans Knowl Data Eng, 20(1):116-129.

[23]Sion R, Atallah M, Prabhakar S, 2004. Rights protection for relational data. IEEE Trans Knowl Data Eng, 16(12): 1509-1525.

[24]Wang YM, Gao YX, 2012. The digital watermarking algorithm of the relational database based on the effective bits of numerical field. World Automation Congress, p.1-4.

[25]Wolfgang RB, Delp EJ, 1996. A watermark for digital images. Proc 3rd IEEE Int Conf on Image Processing, p.219-222.

[26]Wylie JE, Mineau GP, 2003. Biomedical databases: protecting privacy and promoting research. Trends Biotechnol, 21(3):113-116.

[27]Zhang LZ, Gao W, Jiang N, et al., 2011. Relational databases watermarking for textual and numerical data. Int Conf on Mechatronic Science, Electric Engineering and Computer, p.1633-1636.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE