skip to main content
10.1145/1791212.1791223acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

Self-identifying sensor data

Published:12 April 2010Publication History

ABSTRACT

Public-use sensor datasets are a useful scientific resource with the unfortunate feature that their provenance is easily disconnected from their content. To address this we introduce a technique to directly associate provenance information with sensor datasets. Our technique is similar to traditional watermarking but is intended for application to unstructured datasets. Our approach is potentially imperceptible given sufficient margins of error in datasets, and is robust to a number of benign but likely transformations including truncation, rounding, bit-flipping, sampling, and reordering. We provide algorithms for both one-bit and blind mark checking. Our algorithms are probabilistic in nature and are characterized by a combinatorial analysis.

References

  1. Rakesh Agrawal and Jerry Kiernan. Watermarking relational databases. In VLDB '02: Proceedings of the 28th international conference on Very Large Data Bases, pages 155--166. VLDB Endowment, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Karen S. Baker and Lynn Yarmey. Data stewardship: Environmental data curation and a web-of-repositories. The International Journal of Digital Curation, 4(2), 2009.Google ScholarGoogle ScholarCross RefCross Ref
  3. Deepavali Bhagwat, Laura Chiticariu, Wang Chiew Tan, and Gaurav Vijayvargiya. An annotation management system for relational databases. VLDB J., 14(4):373--396, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  4. Peter Buneman, Adriane Chapman, and James Cheney. Provenance management in curated databases. In SIGMOD '06: Proceedings of the 2006 ACM SIGMOD international conference on Management of data, pages 539--550, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Richard Chbeir and David Gross-Amblard. Multimedia and metadata watermarking driven by application constraints. In MMM. IEEE, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  6. Wang chiew Tan. Containment of relational queries with annotation propagation. In In Proceedings of the International Workshop on Database and Programming Languages (DBPL, pages 37--53, 2003.Google ScholarGoogle Scholar
  7. Ingemar J. Cox and Matt L. Miller. The first 50 years of electronic watermarking. EURASIP J. Appl. Signal Process., 2002(2):126--132, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Yingwei Cui and Jennifer Widom. Lineage tracing for general data warehouse transformations. In 27th International Conference on Very Large Data Bases (VLDB 2001), 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jessica Fridrich and Miroslav Goljan. Comparing robustness of watermarking techniques. In Security and Watermarking of Multimedia Contents, volume 3657 of Proceedings of Spie--the International Society for Optical Engineering, 1999.Google ScholarGoogle Scholar
  10. Ashish Gehani and Ulf Lindqvist. Veil: A system for certifying video provenance. In ISM '07: Proceedings of the Ninth IEEE International Symposium on Multimedia, pages 263--272, Washington, DC, USA, 2007. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Harold I. Jacobson. The maximum variance of restricted unimodal distributions. Ann. Math. Statist., 40(5):1746--1752, 1969.Google ScholarGoogle ScholarCross RefCross Ref
  12. Jonathan Ledlie, Chaki Ng, David A. Holland, Kiran-Kumar Muniswamy-Reddy, Uri Braun, and Margo Seltzer. Provenance-aware sensor data storage. In Proceedings of the 1st IEEE International Workshop on Networking Meets Databases, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Thomas Lee, Stéphane Bressan, and Stuart E. Madnick. Source attribution for querying against semi-structured documents. In Sadri {16}, pages 33--39.Google ScholarGoogle Scholar
  14. Unkyu Park and John Heidemann. Provenance in sensornet republishing. In Proceedings of the 2nd International Provenance and Annotation Workshop, pages 208--292, Salt Lake City, Utah, USA, June 2008. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Sagehen Creek Field Station Data Repository. http://sagehen.ucnrs.org/resources.htm. Last visited 10/29/09.Google ScholarGoogle Scholar
  16. Fereidoon Sadri, editor. CIKM'98 First Workshop on Web Information and Data Management (WIDM'98), Bathesda, Maryland, USA, November 6, 1998. ACM, 1998.Google ScholarGoogle Scholar
  17. SensorBase. http://sensorbase.org/. Last visited 10/29/09.Google ScholarGoogle Scholar
  18. Hubbard Brook Ecosystem Study. http://www.hubbardbrook.org/. Last visited 10/29/09.Google ScholarGoogle Scholar
  19. UbiSec&Sens Hmac-MD5 Implementation. http://www.ist-ubisecsens.org/downloads/hmac-md5/hmac-md5.php. Last visited 10/29/09.Google ScholarGoogle Scholar
  20. Jennifer Widom. Trio: A system for integrated management of data, acuray and lineage. In Proc. of the International Conference of Data Systems Research (CIDR), 2005.Google ScholarGoogle Scholar

Index Terms

  1. Self-identifying sensor data

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          IPSN '10: Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks
          April 2010
          460 pages
          ISBN:9781605589886
          DOI:10.1145/1791212

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 12 April 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate143of593submissions,24%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader