Data leakage detection (synopsis)


Published on

Published in: Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Data leakage detection (synopsis)

  1. 1. Data Leakage Detection (Synopsis)
  2. 2. ABSTRACT: We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases we can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party. Objective The objective of the system is to detect when the distributor’s sensitive data has been leaked by hackers, and if possible to identify the agent that leaked the data.
  3. 3. Existing System The Existing System can detect the hackers but the total no of cookies (evidence) will be less and the organization may not be able to proceed legally for further proceedings due to lack of good amount of cookies and the chances to escape of hackers are high. Proposed system In the Proposed System the hackers can be traced with good amount of evidence. In this proposed system the leakage of data is detected by the following methods viz.., generating Fake objects, Watermarking and by Encrypting the data. Modules: Module1 : Administrator Module Module 2 : Employees Module Module 3 : Data Leakage Detection Module
  4. 4. Administrator Module: All the privileges of the website are only available with the administrator. Admin has privileges to accomplish the following responsibilities/tasks: • Manage Users (Add, Edit, Delete, Lock/Unlock, Assign Permissions). • Manage Articles (Add, Edit, Update, Delete). • Manage Categories (Add, Edit, Update, Delete). • Send Messages • Upload Documents Employee Module: Some of the privileges are restricted to the employee by the administrator. Only few permissions are available with the employees. Employees have the following task/responsibilities. Employees have Read-only access to the content. • Employees can Read the articles • Download the Documents • Read the messages which are send by the Admin • Discuss the content in the Discussion Board.
  5. 5. Data Leakage Detection: The main scope of this module is provide complete information about the data/content that is accessed by the users within the website. • Forms Authentication technique is used to provide security to the website in order to prevent the leakage of the data. • Continuous observation is made automatically and the information is send to the administrator so that he can identify whenever the data is leaked. • Above all the important aspect providing proof against the Guilty Objects. The following techniques are used. o Fake Object Generation. o Watermarking.
  6. 6. Flow Char for implementation of the following Alogirhtms: (a)Allocation for Explict Data Request(EF) with fake objects (b) Agent Selection for e-random and e-optimal “IN Both the above case Start CREATEFAKCEOBJECT() METHOD GENERATES A FAKEOBJECT.” User Request R Explicit Check the Condition Select the agent and add the fake. IF B> 0 object Evaluate The Loop. Create Fake Object is Invoked Loop Iterates for n number of requests User Receives the Output. Stop Else Exit
  7. 7. Flow Char for implementation of the following Alogirhtms: (a) Allocation for Sample Data Request(EF) without any fake objects: (b) Agent Selection for e-random and e-optimal “In Both the following cases Select Method() returns the value of ∑ Ri n Rj “ Start User Request R Explicit Check the Condition Select the agent and add the fake. Loop Iterates for n number of requests IF B> 0 Evaluate The Loop. User Receives the Stop SelectObject() Method is Invoked Output. Else Exit
  8. 8. object HARDWARE AND SOFTWARE REQUIREMENTS Software Requirements: Language : Servlets, JSP Technologies : JAVA IDE : Visual Studio 2008 Operating System : Microsoft Windows XP SP2 or Later Version Hardware Requirements: Processor : Intel Pentium or more
  9. 9. RAM : 512 MB (Minimum) Hard Disk : 40 GB
  10. 10. RAM : 512 MB (Minimum) Hard Disk : 40 GB