Security for Numeric Relational Database Using Traitor Identification: A Survey

Dhanashri Varute,A. Mohanpurkar
Abstract:: The increasing popularity of an internet and its usage has raised the use of digital data at large extent. In this situation, the fundamental need is to provide protection for ownership of data and find out the blameworthy user. This appeals the facilities like content right protection and traitor identification on relational database. To fulfill these features, the fingerprinting schemes should focus on challenges like usability constraint non-violation, minimum distortion, robustness against collusion attack etc. This paper gives a brief overview of fingerprinting schemes which were proposed earlier to address these issues.
Computer Science
What problem does this paper attempt to address?