data leakage detection review 2

Post on 08-Nov-2014

27 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Datat leakage Detection.

TRANSCRIPT

Project On“Data Leakage Detection”

Shahnawaz Joad( AC07UCS089 )

Sivakumar.p( AC07UCS096 )

Govardhan Chowdary.j

( AC07UCS132 )

By

ADHIYAMAAN COLLEGE OF ENGG(DEPT OF C.S.E)

Guided By : Mrs.D.GEETHA

OVERVIEW

Abstract Existing System Limitations of Existing System Proposed System Modules Screen shots

ABSTRACT

To detect when the distributor’s sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data.

Adding “fake” objects to the distributed set.

Do not follows Alterations of the released Data and can also inject “realistic but fake” data records to identify guilty parties.

EXISTING SYSTEM

o It Uses Methods Like Watermark Technique.

o e.g., a unique code is embedded in each distributed copy.

o If that copy is later discovered in the hands of an unauthorized party, the leaker can be identified.

EXAMPLE

LIMITATIONS OF EXISTING SYSTEM

We Can Easily Modify the unique code i.e. Watermark symbols.

Difficult to find who leaked the data.

PROPOSED SYSTEM

To find the Guilty Agents.(i.e. the person who is leaking the data)

Also to Find when the data has been leaked.

Applying Perturbation is a very useful technique where the data is modified and made “less sensitive” before being handed to agents.

MODULES

I. Data Allocation Module

II. Fake Object Module

III. Optimization Module

IV. Data Distributor

1. DATA ALLOCATION MODULE

How can the distributor “intelligently” give data to agents in order to improve the chances of detecting a guilty agent.

Probability of choosing best way to distribute the data. 

2. FAKE OBJECT MODULE

Fake objects are objects generated by the distributor in order to increase the chances of detecting agents that leak data.

The distributor may be able to add fake objects to the distributed data in order to improve his effectiveness in detecting guilty agents.

Our use of fake objects is inspired by the use of “trace” records in mailing lists.

3. OPTIMIZATION MODULE

The Optimization Module is the distributor’s data allocation to agents has one constraint and one objective.

The distributor’s constraint is to satisfy agents’ requests, by providing them with the number of objects they request or with all available objects that satisfy their conditions.

His objective is to be able to detect an agent who leaks any portion of his data.

4. DATA DISTRIBUTOR

A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop).

The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means.

SCREEN SHOTS

top related