SlideShare uma empresa Scribd logo
1 de 33
Baixar para ler offline
DATA LEAKAGE DETECTION
[DLD]
BY:[BE COMP]
Kaustubh R. Bojewar (B8544228)
Ronak R. Makadiya (B8544232)
Pranita S. Salla (B8544249)
Prajesh P. Shah (B8544253)
Under the guidance of
Ms. Roshani Ade
G.H RAISONI COLLEGE OF ENGINEERING AND TECHNOLOGY
1
AGENDA
 PROBLEM DEFINITION
 PROBLEM SETUPAND MATHEMATICAL
NOTATION
 SYSTEM ARCHITECTURE DESIGN
 SOFTWARE AND HARDWARE REQUIREMENT
 SCREEN SHOTS
 UML DIAGRAMS
 ADVANTAGES
 FUTURE SCOPES
 CONCLUSION
 REFERENCES
2
DATA LEAKAGE DETECTION
PROBLEM DEFINITION
 In the course of doing business, sometimes sensitive
data must be handed over to supposedly trusted third
parties.
 Our goal is to detect when the distributor's sensitive
data has been leaked by agents, through probability
calculation using number of download for a particular
agent.
3
DATA LEAKAGE DETECTION
PROBLEM SETUPAND NOTATION
Mathematical model
Title:-
DATA LEAKAGE DETECTION.
Problem statement: -
To build a application that helps in Detecting the data which
has been leaked. Also it helps in finding Guilty Agent
from the given set of agents which has leaked the data using
Probability Distribution through number of Downloads.
4
DATA LEAKAGE DETECTION
Problem description:
Let,
DLD is the system such that DLD={A,D,T,U,R,S,U*,C,M,F}.
1.{A} is the Administrator who controls entire operation’s
performed in the Software
2.{D} is the Distributor who will send data T to different agents U.
3. T is the set of data object that are supplied to agents.
T can be of any type and size, e.g., they could be tuples in a
relation, or relations in a database.
T= {t1,t2,t3,...tn}
4. U is the set of Agents who will receive the data from the
distributor A
U={u1,u2,u3,...un}
5. R is the record set of Data objects which is sent to agents
R={t1,t3,t5..tm} R is a Subset of T
5
DATA LEAKAGE DETECTION
6. S is the record set of data objects which are leaked.
S={t1,t3,t5..tm} S is a Subset of T
7. U* is the set of all agents which may have leaked the data
U*={u1,u3,...um} U* is a subset of U
8. C is the set of conditions which will be given by the
agents to the distributor.
C={cond1,cond2,cond3,...,condn}
9. M is set of data objects to be send in Sample Data
Request algorithm
M={m1,m2,m3,...,mn}
6
DATA LEAKAGE DETECTION
ACTIVITY:
SAMPLE is a function for a data allocation for any mi subset of records from
T. The transition can be shown as:
Ri =SAMPLE(T, mi)
EXPLICIT is a function for a data allocation for which satisfies the condition.
Ri =EXPLICIT(T,condi)
SELECTAGENT is the function used in EXPLICIT algorithm for finding the
agent .
SELECTAGENT(R1,R2….Rn)
SELECTOBJECT is the function used in SAMPLE algorithm for selecting the
data Objects
SELECTOBJECT(i,Ri)
SIMPLE ENCRYPTO is the function used to ENCRYPT the file to be sent to the
Agent
7
DATA LEAKAGE DETECTION
DATA STRUCTURES USED:
Array: To store the no of data objects T ,No of agents U , record
set R and to display the particular output.
Execution of functions :
The functions will be executed on a daily basis for number of
times whenever distributor wants to send the data to the agent
and vice versa using C and M.
8
DATA LEAKAGE DETECTION
FUNCTIONAL DEPENDENCY DIAGRAM:
The functional dependency of the system depends upon the
conditions which are given by the agent and no of records which
distributor decides to send to the agents.
Conditions
[C]
No. Of
Records
[M]
Record Set R
which is required
by the Distributor
Agents
[U]
Distributor
[A]
9
DATA LEAKAGE DETECTION
SYSTEM ARCHITECTURE DIAGRAM
10
DATA LEAKAGE DETECTION
SOFTWARE AND HARDWARE
REQUIREMENT
Hardware Interfaces
 2.4 GHZ, 80 GB HDD for installation.
 512 MB memory.
 Users can use any PC based browser clients with IE 5.5
upwards.
Software Interfaces
 JDK 1.6
 Java Swing
 Net beans 6.5
 Socket programming
 Triple AES algorithm
DATA LEAKAGE DETECTION 11
SCREEN SHOTS
DATA LEAKAGE DETECTION 12
1.User Login
DATA LEAKAGE DETECTION 13
2. Agent Form(Request)
DATA LEAKAGE DETECTION 14
3. Agent Form(Download Form)
DATA LEAKAGE DETECTION 15
4.Distributor(View shared files)
DATA LEAKAGE DETECTION 16
5.Distributor(Upload Files)
DATA LEAKAGE DETECTION 17
6. Administrator ( Probability Calc)
18
7. Administrator (Manage Agents)
DATA LEAKAGE DETECTION 19
UML DIAGRAMS
• Data Flow Diagram
• Use Case Diagram
• Class Diagram
• Sequence Diagram
• Activity Diagram
20
DATA LEAKAGE DETECTION
1. Data Flow Diagram
Level 0
21
DATA LEAKAGE DETECTION
Level 1
Level 2
23
DATA LEAKAGE DETECTION
Agent 2 Login View Data
Send Data To
Anonymous
User
Agent n Login View Data
Agent 1 Login View Data
.
.
.
Administrator
Email
Notification
2. Use Case Diagram
24
3.Class Diagram
DATA LEAKAGE DETECTION 25
4.Sequence Diagram
26
DATA LEAKAGE DETECTION
5. Activity Diagram
DATA LEAKAGE DETECTION 27
ADVANTAGES
 This system includes the data hiding along with the
provisional software with which only the data can
be accessed.
 This system gives privileged access to the
administrator (data distributor) as well as the
agents registered by the distributors. Only registered
agents can access the system. The user accounts can
be activated as well as cancelled.
 The exported file will be accessed only by the
system. The agent has given only the permission to
access the software and view the data. If the data is
leaked by the agent’ system the path and agent
information will be sent to the distributor thereby
the identity of the leaked user can be traced.
DATA LEAKAGE DETECTION 28
FUTURE SCOPE
DATA LEAKAGE DETECTION 29
 Currently, we are dealing with only text files in this
project but in future we will try to deal with all types of
files.
 Recent research papers say that it is not possible to find
the exact guilty agent who has leaked the data. Instead,
we are finding out the probability of the agent being
guilty or who has leaked the data through calculation of
number of downloads.
 For more security, we will also provide a verification
code on the agent’s mobile in future.
CONCLUSION
DATA LEAKAGE DETECTION
30
Login-
Registration
Module
Upload file using
secret key
File sharing with
agents
Start HTTP
server
Check guilty
agent
Receives request
for download
Decrypts using
secret key
Java security
framework
Socket
programming
HTTP server
Java swing API
Technology
Agent’s module
Distributor’s module
Data Leakage
Detection System
REFERENCES
 “Data Leakage Detection”Panagiotis Papadimitriou, Student
Member, IEEE, and Hector Garcia-Molina, Member, IEEE
 R. Agrawal and J. Kiernan, “Watermarking Relational
Databases,” Proc. 28th Int’l Conf. Very Large Data Bases
(VLDB ’02), VLDB Endowment, pp. 155-166, 2002.
 P. Bonatti, S.D.C. di Vimercati, and P. Samarati, “An Algebra
for Composing Access Control Policies,” ACM Trans.
Information and System Security, vol. 5, no. 1, pp. 1-35,
2002.
 P. Buneman, S. Khanna, and W.C. Tan, “Why and Where: A
Characterization of Data Provenance,” Proc. Eighth Int’l
Conf. Database Theory (ICDT ’01), J.V. den Bussche and V.
Vianu, eds., pp. 316-330, Jan. 2001
 P. Buneman and W.-C. Tan, “Provenance in Databases,”
Proc. ACM SIGMOD, pp. 1171-1173, 2007.
31
DATA LEAKAGE DETECTION
 Y. Cui and J. Widom, “Lineage Tracing for General Data
Warehouse Transformations,” The VLDB J., vol. 12, pp. 41-
58, 2003.
 F. Hartung and B. Girod, “Watermarking of Uncompressed
and Compressed Video,” Signal Processing, vol. 66, no. 3, pp.
283-301,
 1998.
 S. Jajodia, P. Samarati, M.L. Sapino, and V.S.
Subrahmanian,“Flexible Support for Multiple Access Control
Policies,” ACM
 Trans. Database Systems, vol. 26, no. 2, pp. 214-260, 2001.
 Y. Li, V. Swarup, and S. Jajodia, “Fingerprinting
RelationalDatabases: Schemes and Specialties,” IEEE Trans.
Dependable and
 Secure Computing, vol. 2, no. 1, pp. 34-45, Jan.-Mar. 2005.
 B. Mungamuru and H. Garcia-Molina, “Privacy, Preservation
and Performance: The 3 P’s of Distributed Data
Management,” technical report, Stanford Univ., 2008.
DATA LEAKAGE DETECTION 32
THANKYOU...
33
DATA LEAKAGE DETECTION

Mais conteúdo relacionado

Semelhante a Presentation.pdf

Analytics of Performance and Data Quality for Mobile Edge Cloud Applications
Analytics of Performance and Data Quality for Mobile Edge Cloud ApplicationsAnalytics of Performance and Data Quality for Mobile Edge Cloud Applications
Analytics of Performance and Data Quality for Mobile Edge Cloud ApplicationsHong-Linh Truong
 
Designing and Implementing Effective Logging Strategies
Designing and Implementing Effective Logging StrategiesDesigning and Implementing Effective Logging Strategies
Designing and Implementing Effective Logging StrategiesAndreaCapolei1
 
Implementing a data_science_project (Python Version)_part1
Implementing a data_science_project (Python Version)_part1Implementing a data_science_project (Python Version)_part1
Implementing a data_science_project (Python Version)_part1Dr Sulaimon Afolabi
 
IRJET- Secure Skyline Queries over the Encrypted Data
IRJET- Secure Skyline Queries over the Encrypted DataIRJET- Secure Skyline Queries over the Encrypted Data
IRJET- Secure Skyline Queries over the Encrypted DataIRJET Journal
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET Journal
 
Passport Automation System
Passport Automation SystemPassport Automation System
Passport Automation SystemMegha Sahu
 
What does an event mean? Manage the meaning of your data! | Andreas Wombacher...
What does an event mean? Manage the meaning of your data! | Andreas Wombacher...What does an event mean? Manage the meaning of your data! | Andreas Wombacher...
What does an event mean? Manage the meaning of your data! | Andreas Wombacher...HostedbyConfluent
 
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based EncryptionIRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based EncryptionIRJET Journal
 
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATAANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATAIJCSEIT Journal
 
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery ToolsAntonio Rolle
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdfkristinatemen
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system pptashutosh rai
 
Internet of Things Microservices
Internet of Things MicroservicesInternet of Things Microservices
Internet of Things MicroservicesCapgemini
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET Journal
 
MA Microservices Meetup: Move fast and make things
MA Microservices Meetup: Move fast and make thingsMA Microservices Meetup: Move fast and make things
MA Microservices Meetup: Move fast and make thingsAmbassador Labs
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...IRJET Journal
 

Semelhante a Presentation.pdf (20)

Analytics of Performance and Data Quality for Mobile Edge Cloud Applications
Analytics of Performance and Data Quality for Mobile Edge Cloud ApplicationsAnalytics of Performance and Data Quality for Mobile Edge Cloud Applications
Analytics of Performance and Data Quality for Mobile Edge Cloud Applications
 
Designing and Implementing Effective Logging Strategies
Designing and Implementing Effective Logging StrategiesDesigning and Implementing Effective Logging Strategies
Designing and Implementing Effective Logging Strategies
 
Implementing a data_science_project (Python Version)_part1
Implementing a data_science_project (Python Version)_part1Implementing a data_science_project (Python Version)_part1
Implementing a data_science_project (Python Version)_part1
 
IRJET- Secure Skyline Queries over the Encrypted Data
IRJET- Secure Skyline Queries over the Encrypted DataIRJET- Secure Skyline Queries over the Encrypted Data
IRJET- Secure Skyline Queries over the Encrypted Data
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
 
Passport Automation System
Passport Automation SystemPassport Automation System
Passport Automation System
 
Ws For Aq
Ws For AqWs For Aq
Ws For Aq
 
What does an event mean? Manage the meaning of your data! | Andreas Wombacher...
What does an event mean? Manage the meaning of your data! | Andreas Wombacher...What does an event mean? Manage the meaning of your data! | Andreas Wombacher...
What does an event mean? Manage the meaning of your data! | Andreas Wombacher...
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based EncryptionIRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
 
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATAANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA
 
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
 
[IJET-V1I3P3]
[IJET-V1I3P3][IJET-V1I3P3]
[IJET-V1I3P3]
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 
Internet of Things Microservices
Internet of Things MicroservicesInternet of Things Microservices
Internet of Things Microservices
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
 
MA Microservices Meetup: Move fast and make things
MA Microservices Meetup: Move fast and make thingsMA Microservices Meetup: Move fast and make things
MA Microservices Meetup: Move fast and make things
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
 

Mais de SPAMVEDANT

EJ NOV-18 (Sol) (E-next.in).pdf
EJ NOV-18 (Sol) (E-next.in).pdfEJ NOV-18 (Sol) (E-next.in).pdf
EJ NOV-18 (Sol) (E-next.in).pdfSPAMVEDANT
 
certificate format.docx
certificate format.docxcertificate format.docx
certificate format.docxSPAMVEDANT
 
Animal Welfare.pptx
Animal Welfare.pptxAnimal Welfare.pptx
Animal Welfare.pptxSPAMVEDANT
 

Mais de SPAMVEDANT (6)

PPT 1.pptx
PPT 1.pptxPPT 1.pptx
PPT 1.pptx
 
JSTL.pptx
JSTL.pptxJSTL.pptx
JSTL.pptx
 
EJ NOV-18 (Sol) (E-next.in).pdf
EJ NOV-18 (Sol) (E-next.in).pdfEJ NOV-18 (Sol) (E-next.in).pdf
EJ NOV-18 (Sol) (E-next.in).pdf
 
certificate format.docx
certificate format.docxcertificate format.docx
certificate format.docx
 
Animal Welfare.pptx
Animal Welfare.pptxAnimal Welfare.pptx
Animal Welfare.pptx
 
PPT 1.pptx
PPT 1.pptxPPT 1.pptx
PPT 1.pptx
 

Último

Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 

Último (20)

Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 

Presentation.pdf

  • 1. DATA LEAKAGE DETECTION [DLD] BY:[BE COMP] Kaustubh R. Bojewar (B8544228) Ronak R. Makadiya (B8544232) Pranita S. Salla (B8544249) Prajesh P. Shah (B8544253) Under the guidance of Ms. Roshani Ade G.H RAISONI COLLEGE OF ENGINEERING AND TECHNOLOGY 1
  • 2. AGENDA  PROBLEM DEFINITION  PROBLEM SETUPAND MATHEMATICAL NOTATION  SYSTEM ARCHITECTURE DESIGN  SOFTWARE AND HARDWARE REQUIREMENT  SCREEN SHOTS  UML DIAGRAMS  ADVANTAGES  FUTURE SCOPES  CONCLUSION  REFERENCES 2 DATA LEAKAGE DETECTION
  • 3. PROBLEM DEFINITION  In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties.  Our goal is to detect when the distributor's sensitive data has been leaked by agents, through probability calculation using number of download for a particular agent. 3 DATA LEAKAGE DETECTION
  • 4. PROBLEM SETUPAND NOTATION Mathematical model Title:- DATA LEAKAGE DETECTION. Problem statement: - To build a application that helps in Detecting the data which has been leaked. Also it helps in finding Guilty Agent from the given set of agents which has leaked the data using Probability Distribution through number of Downloads. 4 DATA LEAKAGE DETECTION
  • 5. Problem description: Let, DLD is the system such that DLD={A,D,T,U,R,S,U*,C,M,F}. 1.{A} is the Administrator who controls entire operation’s performed in the Software 2.{D} is the Distributor who will send data T to different agents U. 3. T is the set of data object that are supplied to agents. T can be of any type and size, e.g., they could be tuples in a relation, or relations in a database. T= {t1,t2,t3,...tn} 4. U is the set of Agents who will receive the data from the distributor A U={u1,u2,u3,...un} 5. R is the record set of Data objects which is sent to agents R={t1,t3,t5..tm} R is a Subset of T 5 DATA LEAKAGE DETECTION
  • 6. 6. S is the record set of data objects which are leaked. S={t1,t3,t5..tm} S is a Subset of T 7. U* is the set of all agents which may have leaked the data U*={u1,u3,...um} U* is a subset of U 8. C is the set of conditions which will be given by the agents to the distributor. C={cond1,cond2,cond3,...,condn} 9. M is set of data objects to be send in Sample Data Request algorithm M={m1,m2,m3,...,mn} 6 DATA LEAKAGE DETECTION
  • 7. ACTIVITY: SAMPLE is a function for a data allocation for any mi subset of records from T. The transition can be shown as: Ri =SAMPLE(T, mi) EXPLICIT is a function for a data allocation for which satisfies the condition. Ri =EXPLICIT(T,condi) SELECTAGENT is the function used in EXPLICIT algorithm for finding the agent . SELECTAGENT(R1,R2….Rn) SELECTOBJECT is the function used in SAMPLE algorithm for selecting the data Objects SELECTOBJECT(i,Ri) SIMPLE ENCRYPTO is the function used to ENCRYPT the file to be sent to the Agent 7 DATA LEAKAGE DETECTION
  • 8. DATA STRUCTURES USED: Array: To store the no of data objects T ,No of agents U , record set R and to display the particular output. Execution of functions : The functions will be executed on a daily basis for number of times whenever distributor wants to send the data to the agent and vice versa using C and M. 8 DATA LEAKAGE DETECTION
  • 9. FUNCTIONAL DEPENDENCY DIAGRAM: The functional dependency of the system depends upon the conditions which are given by the agent and no of records which distributor decides to send to the agents. Conditions [C] No. Of Records [M] Record Set R which is required by the Distributor Agents [U] Distributor [A] 9 DATA LEAKAGE DETECTION
  • 11. SOFTWARE AND HARDWARE REQUIREMENT Hardware Interfaces  2.4 GHZ, 80 GB HDD for installation.  512 MB memory.  Users can use any PC based browser clients with IE 5.5 upwards. Software Interfaces  JDK 1.6  Java Swing  Net beans 6.5  Socket programming  Triple AES algorithm DATA LEAKAGE DETECTION 11
  • 14. 2. Agent Form(Request) DATA LEAKAGE DETECTION 14
  • 15. 3. Agent Form(Download Form) DATA LEAKAGE DETECTION 15
  • 18. 6. Administrator ( Probability Calc) 18
  • 19. 7. Administrator (Manage Agents) DATA LEAKAGE DETECTION 19
  • 20. UML DIAGRAMS • Data Flow Diagram • Use Case Diagram • Class Diagram • Sequence Diagram • Activity Diagram 20 DATA LEAKAGE DETECTION
  • 21. 1. Data Flow Diagram Level 0 21 DATA LEAKAGE DETECTION
  • 23. Level 2 23 DATA LEAKAGE DETECTION Agent 2 Login View Data Send Data To Anonymous User Agent n Login View Data Agent 1 Login View Data . . . Administrator Email Notification
  • 24. 2. Use Case Diagram 24
  • 27. 5. Activity Diagram DATA LEAKAGE DETECTION 27
  • 28. ADVANTAGES  This system includes the data hiding along with the provisional software with which only the data can be accessed.  This system gives privileged access to the administrator (data distributor) as well as the agents registered by the distributors. Only registered agents can access the system. The user accounts can be activated as well as cancelled.  The exported file will be accessed only by the system. The agent has given only the permission to access the software and view the data. If the data is leaked by the agent’ system the path and agent information will be sent to the distributor thereby the identity of the leaked user can be traced. DATA LEAKAGE DETECTION 28
  • 29. FUTURE SCOPE DATA LEAKAGE DETECTION 29  Currently, we are dealing with only text files in this project but in future we will try to deal with all types of files.  Recent research papers say that it is not possible to find the exact guilty agent who has leaked the data. Instead, we are finding out the probability of the agent being guilty or who has leaked the data through calculation of number of downloads.  For more security, we will also provide a verification code on the agent’s mobile in future.
  • 30. CONCLUSION DATA LEAKAGE DETECTION 30 Login- Registration Module Upload file using secret key File sharing with agents Start HTTP server Check guilty agent Receives request for download Decrypts using secret key Java security framework Socket programming HTTP server Java swing API Technology Agent’s module Distributor’s module Data Leakage Detection System
  • 31. REFERENCES  “Data Leakage Detection”Panagiotis Papadimitriou, Student Member, IEEE, and Hector Garcia-Molina, Member, IEEE  R. Agrawal and J. Kiernan, “Watermarking Relational Databases,” Proc. 28th Int’l Conf. Very Large Data Bases (VLDB ’02), VLDB Endowment, pp. 155-166, 2002.  P. Bonatti, S.D.C. di Vimercati, and P. Samarati, “An Algebra for Composing Access Control Policies,” ACM Trans. Information and System Security, vol. 5, no. 1, pp. 1-35, 2002.  P. Buneman, S. Khanna, and W.C. Tan, “Why and Where: A Characterization of Data Provenance,” Proc. Eighth Int’l Conf. Database Theory (ICDT ’01), J.V. den Bussche and V. Vianu, eds., pp. 316-330, Jan. 2001  P. Buneman and W.-C. Tan, “Provenance in Databases,” Proc. ACM SIGMOD, pp. 1171-1173, 2007. 31 DATA LEAKAGE DETECTION
  • 32.  Y. Cui and J. Widom, “Lineage Tracing for General Data Warehouse Transformations,” The VLDB J., vol. 12, pp. 41- 58, 2003.  F. Hartung and B. Girod, “Watermarking of Uncompressed and Compressed Video,” Signal Processing, vol. 66, no. 3, pp. 283-301,  1998.  S. Jajodia, P. Samarati, M.L. Sapino, and V.S. Subrahmanian,“Flexible Support for Multiple Access Control Policies,” ACM  Trans. Database Systems, vol. 26, no. 2, pp. 214-260, 2001.  Y. Li, V. Swarup, and S. Jajodia, “Fingerprinting RelationalDatabases: Schemes and Specialties,” IEEE Trans. Dependable and  Secure Computing, vol. 2, no. 1, pp. 34-45, Jan.-Mar. 2005.  B. Mungamuru and H. Garcia-Molina, “Privacy, Preservation and Performance: The 3 P’s of Distributed Data Management,” technical report, Stanford Univ., 2008. DATA LEAKAGE DETECTION 32