SlideShare uma empresa Scribd logo
1 de 5
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit:
                  www.ocularsystems.in Or Call Us On 7385665306



                      Data Leakage Detection
ABSTRACT:

            A data distributor has given sensitive data to a set of supposedly
     trusted agents (third parties). Some of the data is leaked and found in an
     unauthorized place (e.g., on the web or somebody’s laptop). The
     distributor must assess the likelihood that the leaked data came from one or
     more agents, as opposed to having been independently gathered by other
     means. We propose data allocation strategies (across the agents) that
     improve the probability of identifying leakages. These methods do not rely
     on alterations of the released data (e.g., watermarks). In some cases we can
     also inject “realistic but fake” data records to further improve our chances
     of detecting leakage and identifying the guilty party.

EXISTING SYSTEM:

            Traditionally, leakage detection is handled by watermarking, e.g., a
     unique code is embedded in each distributed copy. If that copy is later
     discovered in the hands of an unauthorized party, the leaker can be
     identified. Watermarks can be very useful in some cases, but again,
     involve some modification of the original data. Furthermore, watermarks
     can sometimes be destroyed if the data recipient is malicious. E.g. A
     hospital may give patient records to researchers who will devise new
     treatments. Similarly, a company may have partnerships with other
     companies that require sharing customer data. Another enterprise may
     outsource its data processing, so data must be given to various other
     companies. We call the owner of the data the distributor and the
     supposedly trusted third parties the agents.


PROPOSED SYSTEM:

           Our goal is to detect when the distributor’s sensitive data has been
     leaked by agents, and if possible to identify the agent that leaked the data.
     Perturbation is a very useful technique where the data is modified and

 Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj,
                                        Pune-46
                             E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit:
                 www.ocularsystems.in Or Call Us On 7385665306


    made “less sensitive” before being handed to agents. we develop
    unobtrusive techniques for detecting leakage of a set of objects or records.

           In this section we develop a model for assessing the “guilt” of
    agents. We also present algorithms for distributing objects to agents, in a
    way that improves our chances of identifying a leaker. Finally, we also
    consider the option of adding “fake” objects to the distributed set. Such
    objects do not correspond to real entities but appear realistic to the agents.
    In a sense, the fake objects acts as a type of watermark for the entire set,
    without modifying any individual members. If it turns out an agent was
    given one or more fake objects that were leaked, then the distributor can be
    more confident that agent was guilty.




    Problem Setup and Notation:

           A distributor owns a set T={t1,…,tm}of valuable data objects. The
    distributor wants to share some of the objects with a set of agents U1,U2,…
    Un, but does not wish the objects be leaked to other third parties. The
    objects in T could be of any type and size, e.g., they could be tuples in a
    relation, or relations in a database. An agent Ui receives a subset of
    objects, determined either by a sample request or an explicit request:

           1. Sample request
           2. Explicit request

Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj,
                                       Pune-46
                            E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit:
                  www.ocularsystems.in Or Call Us On 7385665306



     Guilt Model Analysis:

           our model parameters interact and to check if the interactions match
     our intuition, in this section we study two simple scenarios as Impact of
     Probability p and Impact of Overlap between Ri and S. In each scenario
     we have a target that has obtained all the distributor’s objects, i.e., T = S.

     Algorithms:

            1. Evaluation of Explicit Data Request Algorithms

                In the first place, the goal of these experiments was to see
                whether fake objects in the distributed data sets yield significant
                improvement in our chances of detecting a guilty agent. In the
                second place, we wanted to evaluate our e-optimal algorithm
                relative to a random allocation.
            2. Evaluation of Sample Data Request Algorithms

                With sample data requests agents are not interested in particular
                objects. Hence, object sharing is not explicitly defined by their
                requests. The distributor is “forced” to allocate certain objects to
                multiple agents only if the number of requested objects exceeds
                the number of objects in set T. The more data objects the agents
                request in total, the more recipients on average an object has; and
                the more objects are shared among different agents, the more
                difficult it is to detect a guilty agent.


MODULES:

            1. Data Allocation Module:

                  The main focus of our project is the data allocation problem
            as how can the distributor “intelligently” give data to agents in order
            to improve the chances of detecting a guilty agent,Admin can send

 Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj,
                                        Pune-46
                             E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit:
                 www.ocularsystems.in Or Call Us On 7385665306


           the files to the authenticated user, users can edit their account details
           etc. Agent views the secret key details through mail. In order to
           increase the chances of detecting agents that leak data.


           2. Fake Object Module:

                  The distributor creates and adds fake objects to the data that
           he distributes to agents. Fake objects are objects generated by the
           distributor in order to increase the chances of detecting agents that
           leak data. The distributor may be able to add fake objects to the
           distributed data in order to improve his effectiveness in detecting
           guilty agents. Our use of fake objects is inspired by the use of
           “trace” records in mailing lists. In case we give the wrong secret key
           to download the file, the duplicate file is opened, and that fake
           details also send the mail. Ex: The fake object details will display.


           3. Optimization Module:

                  The Optimization Module is the distributor’s data allocation
           to agents has one constraint and one objective. The agent’s
           constraint is to satisfy distributor’s requests, by providing them with
           the number of objects they request or with all available objects that
           satisfy their conditions. His objective is to be able to detect an agent
           who leaks any portion of his data. User can able to lock and unlock
           the files for secure.

           4. Data Distributor:

                 A data distributor has given sensitive data to a set of
           supposedly trusted agents (third parties). Some of the data is leaked
           and found in an unauthorized place (e.g., on the web or somebody’s
           laptop). The distributor must assess the likelihood that the leaked
           data came from one or more agents, as opposed to having been



Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj,
                                       Pune-46
                            E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit:
                  www.ocularsystems.in Or Call Us On 7385665306


            independently gathered by other means.Admin can able to view the
            which file is leaking and fake user’s details also.

Hardware Required:

                 System                :      Pentium IV 2.4 GHz
                 Hard Disk             :      40 GB
                 Floppy Drive          :      1.44 MB
                 Monitor               :      15 VGA colour
                 Mouse                 :       Logitech.
                 Keyboard              :      110 keys enhanced.
                 RAM                   :       256 MB



Software Required:

                 O/S                   :      Windows XP.
                 Language               :     Asp.Net, c#.
                 Data Base              :     Sql Server 2005




 Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj,
                                        Pune-46
                             E-Mail: info@ocularsystems.in

Mais conteúdo relacionado

Destaque

Data leakage detection (synopsis)
Data leakage detection (synopsis)Data leakage detection (synopsis)
Data leakage detection (synopsis)
Mumbai Academisc
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detection
Chaitanya Kn
 

Destaque (15)

Data leakage detection (synopsis)
Data leakage detection (synopsis)Data leakage detection (synopsis)
Data leakage detection (synopsis)
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detection
 
Ultracane
Ultracane Ultracane
Ultracane
 
P2 Project
P2 ProjectP2 Project
P2 Project
 
thermal power station
thermal power stationthermal power station
thermal power station
 
training report NTPC Muzaffarpur Bihar
training report  NTPC Muzaffarpur Bihar training report  NTPC Muzaffarpur Bihar
training report NTPC Muzaffarpur Bihar
 
Nikhil kumar project report ON NTPC KANTI
Nikhil kumar project report ON NTPC KANTINikhil kumar project report ON NTPC KANTI
Nikhil kumar project report ON NTPC KANTI
 
Data leakage detection
Data leakage detection Data leakage detection
Data leakage detection
 
Seminar_Report on EmoSPARK
Seminar_Report on EmoSPARKSeminar_Report on EmoSPARK
Seminar_Report on EmoSPARK
 
Infrared thermography in civil engianeering
Infrared thermography in civil engianeeringInfrared thermography in civil engianeering
Infrared thermography in civil engianeering
 
Multi touch interaction
Multi touch interactionMulti touch interaction
Multi touch interaction
 
main project doument
main project doumentmain project doument
main project doument
 
Multi touch technology
Multi touch technologyMulti touch technology
Multi touch technology
 

Mais de Ocular Systems (7)

Vpidea 12
Vpidea 12Vpidea 12
Vpidea 12
 
Buffer sizing for 802.11 based networks
Buffer sizing for 802.11 based networksBuffer sizing for 802.11 based networks
Buffer sizing for 802.11 based networks
 
Adaptive cluster distance bounding
Adaptive cluster distance boundingAdaptive cluster distance bounding
Adaptive cluster distance bounding
 
dotnet-applications-projects-BCA-BCS-Diploma
dotnet-applications-projects-BCA-BCS-Diplomadotnet-applications-projects-BCA-BCS-Diploma
dotnet-applications-projects-BCA-BCS-Diploma
 
Networking ieee-project-topics-ocularsystems.in
Networking ieee-project-topics-ocularsystems.in Networking ieee-project-topics-ocularsystems.in
Networking ieee-project-topics-ocularsystems.in
 
Image processing ieee-projects-ocularsystems.in-
Image processing ieee-projects-ocularsystems.in-Image processing ieee-projects-ocularsystems.in-
Image processing ieee-projects-ocularsystems.in-
 
Advanced java-applications-projects-ocular systems.in-
Advanced java-applications-projects-ocular systems.in-Advanced java-applications-projects-ocular systems.in-
Advanced java-applications-projects-ocular systems.in-
 

Último

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Data leakage detection

  • 1. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 Data Leakage Detection ABSTRACT: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases we can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party. EXISTING SYSTEM: Traditionally, leakage detection is handled by watermarking, e.g., a unique code is embedded in each distributed copy. If that copy is later discovered in the hands of an unauthorized party, the leaker can be identified. Watermarks can be very useful in some cases, but again, involve some modification of the original data. Furthermore, watermarks can sometimes be destroyed if the data recipient is malicious. E.g. A hospital may give patient records to researchers who will devise new treatments. Similarly, a company may have partnerships with other companies that require sharing customer data. Another enterprise may outsource its data processing, so data must be given to various other companies. We call the owner of the data the distributor and the supposedly trusted third parties the agents. PROPOSED SYSTEM: Our goal is to detect when the distributor’s sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data. Perturbation is a very useful technique where the data is modified and Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 2. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 made “less sensitive” before being handed to agents. we develop unobtrusive techniques for detecting leakage of a set of objects or records. In this section we develop a model for assessing the “guilt” of agents. We also present algorithms for distributing objects to agents, in a way that improves our chances of identifying a leaker. Finally, we also consider the option of adding “fake” objects to the distributed set. Such objects do not correspond to real entities but appear realistic to the agents. In a sense, the fake objects acts as a type of watermark for the entire set, without modifying any individual members. If it turns out an agent was given one or more fake objects that were leaked, then the distributor can be more confident that agent was guilty. Problem Setup and Notation: A distributor owns a set T={t1,…,tm}of valuable data objects. The distributor wants to share some of the objects with a set of agents U1,U2,… Un, but does not wish the objects be leaked to other third parties. The objects in T could be of any type and size, e.g., they could be tuples in a relation, or relations in a database. An agent Ui receives a subset of objects, determined either by a sample request or an explicit request: 1. Sample request 2. Explicit request Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 3. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 Guilt Model Analysis: our model parameters interact and to check if the interactions match our intuition, in this section we study two simple scenarios as Impact of Probability p and Impact of Overlap between Ri and S. In each scenario we have a target that has obtained all the distributor’s objects, i.e., T = S. Algorithms: 1. Evaluation of Explicit Data Request Algorithms In the first place, the goal of these experiments was to see whether fake objects in the distributed data sets yield significant improvement in our chances of detecting a guilty agent. In the second place, we wanted to evaluate our e-optimal algorithm relative to a random allocation. 2. Evaluation of Sample Data Request Algorithms With sample data requests agents are not interested in particular objects. Hence, object sharing is not explicitly defined by their requests. The distributor is “forced” to allocate certain objects to multiple agents only if the number of requested objects exceeds the number of objects in set T. The more data objects the agents request in total, the more recipients on average an object has; and the more objects are shared among different agents, the more difficult it is to detect a guilty agent. MODULES: 1. Data Allocation Module: The main focus of our project is the data allocation problem as how can the distributor “intelligently” give data to agents in order to improve the chances of detecting a guilty agent,Admin can send Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 4. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 the files to the authenticated user, users can edit their account details etc. Agent views the secret key details through mail. In order to increase the chances of detecting agents that leak data. 2. Fake Object Module: The distributor creates and adds fake objects to the data that he distributes to agents. Fake objects are objects generated by the distributor in order to increase the chances of detecting agents that leak data. The distributor may be able to add fake objects to the distributed data in order to improve his effectiveness in detecting guilty agents. Our use of fake objects is inspired by the use of “trace” records in mailing lists. In case we give the wrong secret key to download the file, the duplicate file is opened, and that fake details also send the mail. Ex: The fake object details will display. 3. Optimization Module: The Optimization Module is the distributor’s data allocation to agents has one constraint and one objective. The agent’s constraint is to satisfy distributor’s requests, by providing them with the number of objects they request or with all available objects that satisfy their conditions. His objective is to be able to detect an agent who leaks any portion of his data. User can able to lock and unlock the files for secure. 4. Data Distributor: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 5. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 independently gathered by other means.Admin can able to view the which file is leaking and fake user’s details also. Hardware Required:  System : Pentium IV 2.4 GHz  Hard Disk : 40 GB  Floppy Drive : 1.44 MB  Monitor : 15 VGA colour  Mouse : Logitech.  Keyboard : 110 keys enhanced.  RAM : 256 MB Software Required:  O/S : Windows XP.  Language : Asp.Net, c#.  Data Base : Sql Server 2005 Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in