Skip to main content
Log in

Copyright protection method of big data based on nash equilibrium and constraint optimization

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Data watermarking technology is an effective means to protect the copyright of big data. In order to embed robust and highly available data watermarks, firstly, based on the game theory, a Nash equilibrium model between watermark robustness and data quality is established to solve the optimal number of data group. Then, the mapping relationship between data group and watermark bit is established by using secure hash algorithm.Finally, under the constraint of data usability, the improved particle swarm optimization algorithm is used to solve the optimal solution of data change for each data group, and then the data is changed accordingly to complete the embedding of watermark bit. In order to verify the copyright ownership of big data, the corresponding watermark extraction method is also given in this paper. Watermark extraction is the inverse process of watermark embedding. First, it traverses all the groups and extracts the bits that might be embedded in each group. Then, the actual embedded watermark bit is finally determined by most election strategies. The experimental results show that the proposed method can not only detect watermarks under different attack conditions, ensure the robustness of big data watermarks, but also achieve better data quality, and the comprehensive effect of data watermarks is better than the existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Abourezq M, Idrissi A (2016) Database-as-a-service for big data: an overview. Int J Adv Comput Sci Appl 7(1):157–177

    Google Scholar 

  2. Agrawal R, Kiernan J (2002) Watermarking relational databases. In: VLDB’02: Proceedings of the 28th international conference on very large databases, pp 155–166

  3. Anand S, Singh J (2015) A watermarking relational database based on 5-level dwt using genetic algorithm & pso. Int J Eng Sci Res Technol 4(3):554–559

    Google Scholar 

  4. Cao Z, Shi G, Wu Q (2019) Research on database watermarking based on independent component analysis and multiple rolling. Int J Distrib Sens Netw 15(4):1–11. https://doi.org/10.1177/1550147719841004

    Article  Google Scholar 

  5. Fan M, Li J, Lin Z (2015) A new relational database watermarking algorithm. Comput Appl Softw 32(6):249–251

    Google Scholar 

  6. Ghogare GR, Junnarkar AA (2017) Genetic algorithm based reversible watermarking approach for relational data. Int J Emerging Trends Technol (IJETT) 4:8245–8250

    Google Scholar 

  7. Iftikhar S, Kamran M, Anwar Z (2015) RRW—A robust and reversible watermarking technique for relational data. IEEE Trans Knowl Data Eng 27(4):1132–1145

    Article  Google Scholar 

  8. Imamoglu MB, Ulutas M, Ulutas G (2017) A new reversible database watermarking approach with firefly optimization algorithm. Math Probl Eng. https://doi.org/10.1155/2017/1387375

  9. Jose N (2016) Securing numerical relational dataset using robust and reversible watermarking approach based on genetic algorithm. Asian J Eng Technol Innov 2016(2):170–174

    Google Scholar 

  10. Kamran M, Farooq M (2013) A formal usability constraints model for watermarking of outsourced datasets. IEEE Trans Inf Forens Sec 8(6):1061–1072

    Article  Google Scholar 

  11. Kamran M, Farooq M (2018) A comprehensive survey of watermarking relational databases research. arXiv:180108271

  12. Li RYM, Li HCY (2018) Have housing prices gone with the smelly wind? big data analysis on landfill in hong kong. Sustainability 10(2):341

    Article  Google Scholar 

  13. Luo L, Chang J, Li C (2015) Research on relational database watermarking technology based on genetic algorithm. Theory Alg 1:72–74

    Google Scholar 

  14. Niu X, Zhao L, Huang W, Zhang H (2003) Copyright protection of database by using digital watermarking technology. Electron J 31(12A):2050–2053

    Google Scholar 

  15. Sardroudi HM, Ibrahim S (2010) A new approach for relational database watermarking using image. 5th International Conference on Computer Sciences and Convergence Information Technology, pp 606–610

  16. Shehab M, Bertino E, Ghafoor A (2008) Watermarking relational databases using optimization-based techniques. IEEE Trans Knowl Data Eng 20(1):116–129

    Article  Google Scholar 

  17. Sion R, Atallah M, Prabhakar S (2004) Rights protection for relational data. IEEE Trans Knowl Data Eng 16(12):1509–1525

    Article  Google Scholar 

  18. Tzouramanis T (2016) A robust watermarking scheme for relational databases. International Conference for Internet Technology and Secured Transactions, pp 783–790

  19. Zhang A, Li J (2016) An improved particle swarm optimization algorithm. J Hangzhou Dianzi Univ (Natural Science) 36(6):10–14

    MathSciNet  Google Scholar 

Download references

Acknowledgements

This research is supported by Beijing Key Laboratory of Internet Culture and Digital Dissemination Research (No.ICDDXN004), Beijing Advanced Innovation Center for Materials Genome Engineering, Beijing Information Science and Technology University and Key Lab of Information Network Security of Ministry of Public Security (No.C18601).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yabin Xu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on Privacy-Preserving Computing

Guest Editors: Kaiping Xue, Zhe Liu, Haojin Zhu, Miao Pan and David S.L. Wei

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, Y., Shi, B. Copyright protection method of big data based on nash equilibrium and constraint optimization. Peer-to-Peer Netw. Appl. 14, 1520–1530 (2021). https://doi.org/10.1007/s12083-021-01096-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-021-01096-4

Keywords

Navigation