Top Banner
Project On Data Leakage DetectionShahnawaz Joad ( AC07UCS089 ) Sivakumar.p ( AC07UCS096 ) Govardhan Chowdary.j ( AC07UCS132 ) By ADHIYAMAAN COLLEGE OF ENGG (DEPT OF C.S.E) Guided By : Mrs.D.GEETHA
17

Data Leakage Detection Review 2

Nov 08, 2014

Download

Documents

Ricky Lucas

Datat leakage Detection.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Data Leakage Detection Review 2

Project On“Data Leakage Detection”

Shahnawaz Joad( AC07UCS089 )

Sivakumar.p( AC07UCS096 )

Govardhan Chowdary.j

( AC07UCS132 )

By

ADHIYAMAAN COLLEGE OF ENGG(DEPT OF C.S.E)

Guided By : Mrs.D.GEETHA

Page 2: Data Leakage Detection Review 2

OVERVIEW

Abstract Existing System Limitations of Existing System Proposed System Modules Screen shots

Page 3: Data Leakage Detection Review 2

ABSTRACT

To detect when the distributor’s sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data.

Adding “fake” objects to the distributed set.

Do not follows Alterations of the released Data and can also inject “realistic but fake” data records to identify guilty parties.

Page 4: Data Leakage Detection Review 2

EXISTING SYSTEM

o It Uses Methods Like Watermark Technique.

o e.g., a unique code is embedded in each distributed copy.

o If that copy is later discovered in the hands of an unauthorized party, the leaker can be identified.

Page 5: Data Leakage Detection Review 2

EXAMPLE

Page 6: Data Leakage Detection Review 2

LIMITATIONS OF EXISTING SYSTEM

We Can Easily Modify the unique code i.e. Watermark symbols.

Difficult to find who leaked the data.

Page 7: Data Leakage Detection Review 2

PROPOSED SYSTEM

To find the Guilty Agents.(i.e. the person who is leaking the data)

Also to Find when the data has been leaked.

Applying Perturbation is a very useful technique where the data is modified and made “less sensitive” before being handed to agents.

Page 8: Data Leakage Detection Review 2

MODULES

I. Data Allocation Module

II. Fake Object Module

III. Optimization Module

IV. Data Distributor

Page 9: Data Leakage Detection Review 2

1. DATA ALLOCATION MODULE

How can the distributor “intelligently” give data to agents in order to improve the chances of detecting a guilty agent.

Probability of choosing best way to distribute the data. 

Page 10: Data Leakage Detection Review 2

2. FAKE OBJECT MODULE

Fake objects are objects generated by the distributor in order to increase the chances of detecting agents that leak data.

The distributor may be able to add fake objects to the distributed data in order to improve his effectiveness in detecting guilty agents.

Our use of fake objects is inspired by the use of “trace” records in mailing lists.

Page 11: Data Leakage Detection Review 2

3. OPTIMIZATION MODULE

The Optimization Module is the distributor’s data allocation to agents has one constraint and one objective.

The distributor’s constraint is to satisfy agents’ requests, by providing them with the number of objects they request or with all available objects that satisfy their conditions.

His objective is to be able to detect an agent who leaks any portion of his data.

Page 12: Data Leakage Detection Review 2

4. DATA DISTRIBUTOR

A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop).

The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means.

Page 13: Data Leakage Detection Review 2

SCREEN SHOTS

Page 14: Data Leakage Detection Review 2
Page 15: Data Leakage Detection Review 2
Page 16: Data Leakage Detection Review 2
Page 17: Data Leakage Detection Review 2