Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1791212.1791223acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

Self-identifying sensor data

Published: 12 April 2010 Publication History

Abstract

Public-use sensor datasets are a useful scientific resource with the unfortunate feature that their provenance is easily disconnected from their content. To address this we introduce a technique to directly associate provenance information with sensor datasets. Our technique is similar to traditional watermarking but is intended for application to unstructured datasets. Our approach is potentially imperceptible given sufficient margins of error in datasets, and is robust to a number of benign but likely transformations including truncation, rounding, bit-flipping, sampling, and reordering. We provide algorithms for both one-bit and blind mark checking. Our algorithms are probabilistic in nature and are characterized by a combinatorial analysis.

References

[1]
Rakesh Agrawal and Jerry Kiernan. Watermarking relational databases. In VLDB '02: Proceedings of the 28th international conference on Very Large Data Bases, pages 155--166. VLDB Endowment, 2002.
[2]
Karen S. Baker and Lynn Yarmey. Data stewardship: Environmental data curation and a web-of-repositories. The International Journal of Digital Curation, 4(2), 2009.
[3]
Deepavali Bhagwat, Laura Chiticariu, Wang Chiew Tan, and Gaurav Vijayvargiya. An annotation management system for relational databases. VLDB J., 14(4):373--396, 2005.
[4]
Peter Buneman, Adriane Chapman, and James Cheney. Provenance management in curated databases. In SIGMOD '06: Proceedings of the 2006 ACM SIGMOD international conference on Management of data, pages 539--550, New York, NY, USA, 2006. ACM.
[5]
Richard Chbeir and David Gross-Amblard. Multimedia and metadata watermarking driven by application constraints. In MMM. IEEE, 2006.
[6]
Wang chiew Tan. Containment of relational queries with annotation propagation. In In Proceedings of the International Workshop on Database and Programming Languages (DBPL, pages 37--53, 2003.
[7]
Ingemar J. Cox and Matt L. Miller. The first 50 years of electronic watermarking. EURASIP J. Appl. Signal Process., 2002(2):126--132, 2002.
[8]
Yingwei Cui and Jennifer Widom. Lineage tracing for general data warehouse transformations. In 27th International Conference on Very Large Data Bases (VLDB 2001), 2001.
[9]
Jessica Fridrich and Miroslav Goljan. Comparing robustness of watermarking techniques. In Security and Watermarking of Multimedia Contents, volume 3657 of Proceedings of Spie--the International Society for Optical Engineering, 1999.
[10]
Ashish Gehani and Ulf Lindqvist. Veil: A system for certifying video provenance. In ISM '07: Proceedings of the Ninth IEEE International Symposium on Multimedia, pages 263--272, Washington, DC, USA, 2007. IEEE Computer Society.
[11]
Harold I. Jacobson. The maximum variance of restricted unimodal distributions. Ann. Math. Statist., 40(5):1746--1752, 1969.
[12]
Jonathan Ledlie, Chaki Ng, David A. Holland, Kiran-Kumar Muniswamy-Reddy, Uri Braun, and Margo Seltzer. Provenance-aware sensor data storage. In Proceedings of the 1st IEEE International Workshop on Networking Meets Databases, 2005.
[13]
Thomas Lee, Stéphane Bressan, and Stuart E. Madnick. Source attribution for querying against semi-structured documents. In Sadri {16}, pages 33--39.
[14]
Unkyu Park and John Heidemann. Provenance in sensornet republishing. In Proceedings of the 2nd International Provenance and Annotation Workshop, pages 208--292, Salt Lake City, Utah, USA, June 2008. Springer-Verlag.
[15]
Sagehen Creek Field Station Data Repository. http://sagehen.ucnrs.org/resources.htm. Last visited 10/29/09.
[16]
Fereidoon Sadri, editor. CIKM'98 First Workshop on Web Information and Data Management (WIDM'98), Bathesda, Maryland, USA, November 6, 1998. ACM, 1998.
[17]
SensorBase. http://sensorbase.org/. Last visited 10/29/09.
[18]
Hubbard Brook Ecosystem Study. http://www.hubbardbrook.org/. Last visited 10/29/09.
[19]
UbiSec&Sens Hmac-MD5 Implementation. http://www.ist-ubisecsens.org/downloads/hmac-md5/hmac-md5.php. Last visited 10/29/09.
[20]
Jennifer Widom. Trio: A system for integrated management of data, acuray and lineage. In Proc. of the International Conference of Data Systems Research (CIDR), 2005.

Cited By

View all
  • (2020)Memory Incentive Provenance (MIP) to Secure the Wireless Sensor Data StreamIntelligent Computing10.1007/978-3-030-52243-8_20(255-277)Online publication date: 4-Jul-2020
  • (2019)Sensing as a Service Revisited: A Property Rights Enforcement and Pricing Model for IIoT Data MarketplacesEconomics of Grids, Clouds, Systems, and Services10.1007/978-3-030-36027-6_11(127-139)Online publication date: 24-Nov-2019
  • (2017)Merkle-Hellman knapsack-side channel monitoring based secure scheme for detecting provenance forgery and selfish nodes in wireless sensor networks2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT)10.1109/ICECCT.2017.8117950(1-8)Online publication date: Feb-2017
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
IPSN '10: Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks
April 2010
460 pages
ISBN:9781605589886
DOI:10.1145/1791212
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 April 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. provenance
  2. self-identifying data

Qualifiers

  • Research-article

Conference

IPSN '10
Sponsor:

Acceptance Rates

Overall Acceptance Rate 143 of 593 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 19 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Memory Incentive Provenance (MIP) to Secure the Wireless Sensor Data StreamIntelligent Computing10.1007/978-3-030-52243-8_20(255-277)Online publication date: 4-Jul-2020
  • (2019)Sensing as a Service Revisited: A Property Rights Enforcement and Pricing Model for IIoT Data MarketplacesEconomics of Grids, Clouds, Systems, and Services10.1007/978-3-030-36027-6_11(127-139)Online publication date: 24-Nov-2019
  • (2017)Merkle-Hellman knapsack-side channel monitoring based secure scheme for detecting provenance forgery and selfish nodes in wireless sensor networks2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT)10.1109/ICECCT.2017.8117950(1-8)Online publication date: Feb-2017
  • (2016)Novel approach for detecting malicious activity in WSN using securing scheme2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)10.1109/ICATCCT.2016.7911968(76-80)Online publication date: 2016
  • (2016)On the Properties of Non-Media Digital Watermarking: A Review of State of the Art TechniquesIEEE Access10.1109/ACCESS.2016.25708124(2670-2704)Online publication date: 2016
  • (2015)Self-Identifying Data for Fair UseJournal of Data and Information Quality10.1145/26874225:3(1-30)Online publication date: 2-Mar-2015
  • (2015)A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor NetworksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2013.4412:3(256-269)Online publication date: May-2015
  • (2014)Sensor Data Hiding Based on Image Watermarking Using Interpolation Technique over Inter-Packet DelaysApplied Mechanics and Materials10.4028/www.scientific.net/AMM.573.543573(543-548)Online publication date: Jun-2014
  • (2013)Secure Provenance Transmission for Streaming DataIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2012.3125:8(1890-1903)Online publication date: 1-Aug-2013
  • (2012)Demonstrating a lightweight data provenance for sensor networksProceedings of the 2012 ACM conference on Computer and communications security10.1145/2382196.2382312(1022-1024)Online publication date: 16-Oct-2012
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media