SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 151
A MODEL TO FIND THE AGENT WHO RESPONSIBLE FOR DATA
LEAKAGE
Bhagwan D. Thorat1
, P. R. Devale2
1
Research Scholar, M-Tech Information Technology, BVDUCOEP, Maharashtra, India
2
Professor, Information Technology, BVDUCOEP, Maharashtra, India
Abstract
In this research paper, we implement the model to find the agent who responsible for data leakage system. The data leakage is one
type of risk. Many times distributor sends some important data to two or more agents, but several times the information is
disclosure and found unauthorized place or unauthorized person. The multiple ways to distributed important information i.e. e-
mail, web site, FTP, databases, disk, spreadsheet etc. Due to this purpose information accessing in a safe way is become new
topic of research and it became a contestant part to finding leakages. In this work we implement a system for distributing
information to agents. In this method we add fake object to the distributed original data to the agent in such a way that improves
the changes to finding a leakage. If agent sends this sensitive data to unauthorized person then distributor can receive one data
leaked SMS, after that distributor can find the guilty agent who leaked the data.
Keywords: Significant data, fake data, guilty agent.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Information leakage detection is one of the most significant
issues in corporate dealing mainly in current trend. In
corporate business companies share client information with
each other who are in association with that companies. In
this situation information security is significant so
information leakage detection will play important role.
Companies send or handed over the important information
to trusted agent. For example in research center some
scientist can share important new research information to
each other through trusted agents. Similarly another
enterprise may outsource its information processing so
information must be given to lots of other partner’s. Usually
information leakage finding is handled by watermarking.
E.g. an exclusive code is embedded in each agent copy. If
that copy finds an unauthorized person the guilty agent can
be identified. It is very useful in certain cases, but again
involves some alterations of the original data. In this model
we solve the drawback of watermarking using data leakage
detection system.
In this paper we develop a model to finding the agent who is
responsible for data leakage detection system. We develop
the model using the C sharp dot net technology to
implement the model and use SQL server as database for
backend support to store all information. In this model the
agent send request to distributor for the data and distributor
sends data back to agent by adding fake object in that data.
If any one of the agents cheats the distributor by sending the
data to unauthorized person, the distributor can detect who
is guilty agent using guilty agent model.
2. PRECEDING SYSTEM
In the existing system usually information leakage detection
is handled by the watermarking technology. E.g. an
exclusive code is embedded in each agent copy. If those
copies find an unauthorized person the guilty agent or leaker
can be identified. It is very useful technology. In watermark
system one drawback is that sometimes original data can
change or deleted.
3. PROJECTED SYSTEM
In the previous system watermarking technique is used. In
this watermark technique a code is embedded in each agent
copy and that code is find out to another unauthorized
person then we decided the data was leaked but in
watermarking system one drawback is that some time
original data is changed. This drawback will be overcome to
the data leakage detection system using fake object concept.
In this projected system our aim is that to detect the
administrator’s sensitive information has been leaked by the
trusted agent and possible to identify the person who leaked
the information. The data leakage detection system is a very
convenient method where the information is changed by
adding the fake object to the original data before handover
to the agent or trusted third party. Now we develop one
method in this system to assess the guilty agent. We also
using one new algorithm to this technique is that suppose
agent send the request to the distributor for the data and
distributor sends data back to agent by adding fake object in
that original data and suppose any one of the agent cheats
the distributors by sending the information to unauthorized
person the distributor received one message that your data is
leaked. After that distributor can detect who is guilty agent
using guilt agent model and decide the fraud person along
with the probability. A graph is used to display the
probability of agent who leaked the data maximum time.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 152
4. IMPLEMENTATION PLAN
In this application we try to develop a model to finding the
agent who is responsible for data leakage detection system.
We develop the model using the C sharp dot net technology
and Microsoft SQL server as database for backend support
to store the file name, file path and fake object information
for future reference when the distributor sends a file to
agent. Same as when agent sends a file to unauthorized
agent the sequence is store in the database and using this
database the distributor received message that your data is
leaked. After that we can find the guilty agent using guilt
agent model.
5. MODULE DESCRIPTION
A) Login-Registration Module:-This module is specially
implemented to provide the authority to agent and
distributor to access the other modules of the project
and also use new registration of agent.
B) Data Send Module:-This module is specially
implemented to handover information from
administrator to agents and same module used for
transfer data from agent to unauthorized agents.
C) Manage Users Module:-This module is specially
designed to approve the new registered agent.
D) Upload Article:-This module is specially designed to
upload the new data.
E) Guilt Agent Module:-This module is specially
designed to identify the guilty agent. This module
checks the fake object in leaked data and determines the
guilty agent and decides the fraud person along with the
probability. A graph is used to display the probability of
agent who leaked the data maximum time.
Algorithm
1. Start
2. Agent send request to distributor for data.
R= {R1, R2, ………Rn}
REC= {r1, r2, …….rm} F={F1, F2, …….Fz}
3. Distributor select agent to send data.
M= {M1, M2, …….Mn}
The distributor select agents and gives requested data
R1, R2 to agents.
4. Distributors creates fake object & allocates it to the
agents randomly.
5. Now the distributor checks how many agents have
already received data.
6. Distributor checks remaining agents.
7. Distributor chooses remaining agents to send data.
8. Find the guilty agent and calculate the probability for
guilt agent to compute this probability we need to
find by the guilty agents.
9. Stop.
6. RESULT
Fig1. Login Page
Fig2. Home Page
Fig3. Send Request page
Fig4. Send Data Page
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 153
Fig5. Guilty Agent Detection Module page
Fig-6. Calculate probability for Guilty agent
7. CONCLUSION
When a distributors necessity to send sensitive information
to a trusted agents, it is needed to monitoring on the
distribution process. When sensitive information has to be
send through trusted agents the chances to leak the data is
increased. In this research paper we try to solve this problem
using fake object method. In this method when agent send
request to distributor for the data and distributor send data
back to agent by adding fake object in that original data. If
any one of the agent cheats the distributor by sending the
data to unauthorized person the distributor can detects who
is guilty agent using guilty agent module. In this module
distributor can browse the leaked data and find out the guilty
agent ID and name by using fake object. We implement
algorithm that are having data allocation method for
enhancing the probabilities of distributor can identifying the
leaker.
REFERENCES
[1]. Panagiotis Papadimitriou, Hector Garcia-Molina “A
Model for Data Leakage Detection.” Stanford University
353 serra street, Stanford, CA 94305, USA.
[2]. Bhagwan D. Thorat, P. R. Devale “Identifying Guilty
Agent for Data Leakage Detection System.” International
Journal of Advance Research in Computer Science and
Management Studies. Volume 2, Issue 3, March 2014.
[3]. Shreyta Raj, Ravinder Purwar, Ashutosh Dangwal “A
Model for identifying Guilty Agents in Data Transmission."
International Journal of Advanced Research in Computer
Engg. & Technology. Vol. 1, Issue 4, June 2012.
[4]. Y. Jagadeesh Kumar, M Chinna Rao. “Unauthorized
Data Access Detection by Insertion of Duplicate Data
Records.” IJRCCT, Vol. 1, Issue 7, December 2012.
[5]. Sridhar gade, Kiran Kumar Munde, Krishnaiah R. V. “
Data Allocation Strategies for Leakage Detection.” IOSR
Journal for Computer Engg. Vol 5, Issue 2, Sep-Oct. 2012.
[6]. R. Arul Murugan, Kavitha. E, Nivedha. M, Subashini. S
“Data Leakage Detection and Prevention Using Perturbation
and Unobtrusive Analyzes.” International Journal of
Communications and Engineering. Vol 4, Issue 3, March
2012.
BIOGRAPHIES
Bhagwan D. Thorat, B.E. Computer
Engineering, Pursuing M-Tech Information
Technology in Bharati Vidyapeeth Deemed
University College of Engineering, Pune,
Maharashtra, India.
Prakash R. Devale, M.E. Computer Engg,
Pursuing Ph. D in Bharati Vidyapeeth
University, Pune, Maharashtra, India.
Currently working as Professor in the
Department of Information Technology.
Bharati Vidyapeeth Deemed University
College of Engineering, Pune, Maharashtra, India.

More Related Content

What's hot

Privacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage SystemPrivacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage System
Kumar Goud
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionbunnz12345
 
Data Leakage Detectionusing Distribution Method
Data Leakage Detectionusing Distribution Method Data Leakage Detectionusing Distribution Method
Data Leakage Detectionusing Distribution Method
IJMER
 
IRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET- Data Leakage Detection System
IRJET- Data Leakage Detection System
IRJET Journal
 
IRJET- Analysis of Brand Value Prediction based on Social Media Data
IRJET-  	  Analysis of Brand Value Prediction based on Social Media DataIRJET-  	  Analysis of Brand Value Prediction based on Social Media Data
IRJET- Analysis of Brand Value Prediction based on Social Media Data
IRJET Journal
 
modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches
Venkat Projects
 
Phishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A ReviewPhishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A Review
theijes
 
Classification with R
Classification with RClassification with R
Classification with R
Najima Begum
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Happiest Minds Technologies
 
IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
IRJET Journal
 
C3602021025
C3602021025C3602021025
C3602021025
ijceronline
 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni
Venkat Projects
 
Jpdcs1(data lekage detection)
Jpdcs1(data lekage detection)Jpdcs1(data lekage detection)
Jpdcs1(data lekage detection)Chaitanya Kn
 
APPLICATION WISE ANNOTATIONS ON INTELLIGENT DATABASE TECHNIQUES
APPLICATION WISE ANNOTATIONS ON INTELLIGENT DATABASE TECHNIQUESAPPLICATION WISE ANNOTATIONS ON INTELLIGENT DATABASE TECHNIQUES
APPLICATION WISE ANNOTATIONS ON INTELLIGENT DATABASE TECHNIQUES
Journal For Research
 
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Darshan Gorasiya
 
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
ijceronline
 
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
IRJET Journal
 
Comparison Between WEKA and Salford System in Data Mining Software
Comparison Between WEKA and Salford System in Data Mining SoftwareComparison Between WEKA and Salford System in Data Mining Software
Comparison Between WEKA and Salford System in Data Mining Software
Universitas Pembangunan Panca Budi
 
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data FeedEfficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
IRJET Journal
 

What's hot (19)

Privacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage SystemPrivacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage System
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data Leakage Detectionusing Distribution Method
Data Leakage Detectionusing Distribution Method Data Leakage Detectionusing Distribution Method
Data Leakage Detectionusing Distribution Method
 
IRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET- Data Leakage Detection System
IRJET- Data Leakage Detection System
 
IRJET- Analysis of Brand Value Prediction based on Social Media Data
IRJET-  	  Analysis of Brand Value Prediction based on Social Media DataIRJET-  	  Analysis of Brand Value Prediction based on Social Media Data
IRJET- Analysis of Brand Value Prediction based on Social Media Data
 
modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches
 
Phishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A ReviewPhishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A Review
 
Classification with R
Classification with RClassification with R
Classification with R
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
 
IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
 
C3602021025
C3602021025C3602021025
C3602021025
 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni
 
Jpdcs1(data lekage detection)
Jpdcs1(data lekage detection)Jpdcs1(data lekage detection)
Jpdcs1(data lekage detection)
 
APPLICATION WISE ANNOTATIONS ON INTELLIGENT DATABASE TECHNIQUES
APPLICATION WISE ANNOTATIONS ON INTELLIGENT DATABASE TECHNIQUESAPPLICATION WISE ANNOTATIONS ON INTELLIGENT DATABASE TECHNIQUES
APPLICATION WISE ANNOTATIONS ON INTELLIGENT DATABASE TECHNIQUES
 
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
 
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
 
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
 
Comparison Between WEKA and Salford System in Data Mining Software
Comparison Between WEKA and Salford System in Data Mining SoftwareComparison Between WEKA and Salford System in Data Mining Software
Comparison Between WEKA and Salford System in Data Mining Software
 
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data FeedEfficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
Efficiently Detecting and Analyzing Spam Reviews Using Live Data Feed
 

Viewers also liked

5 s implementation and its effect on physical workload
5 s implementation and its effect on physical workload5 s implementation and its effect on physical workload
5 s implementation and its effect on physical workload
eSAT Publishing House
 
Transient stability analysis of distributed generation
Transient stability analysis of distributed generationTransient stability analysis of distributed generation
Transient stability analysis of distributed generation
eSAT Publishing House
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manets
eSAT Publishing House
 
Enhancing minimal virtual machine migration in cloud environment
Enhancing minimal virtual machine migration in cloud environmentEnhancing minimal virtual machine migration in cloud environment
Enhancing minimal virtual machine migration in cloud environment
eSAT Publishing House
 
Implementation of sql server based on sqlite engine on
Implementation of sql server based on sqlite engine onImplementation of sql server based on sqlite engine on
Implementation of sql server based on sqlite engine on
eSAT Publishing House
 
A novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technologyA novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technology
eSAT Publishing House
 
Characteristic orthogonal polynimial application to galerkin indirect variati...
Characteristic orthogonal polynimial application to galerkin indirect variati...Characteristic orthogonal polynimial application to galerkin indirect variati...
Characteristic orthogonal polynimial application to galerkin indirect variati...
eSAT Publishing House
 
Potential utilisation of untreatedtreated textile effluent in concrete
Potential utilisation of untreatedtreated textile effluent in concretePotential utilisation of untreatedtreated textile effluent in concrete
Potential utilisation of untreatedtreated textile effluent in concrete
eSAT Publishing House
 
Structural weight optimization of a bracket using
Structural weight optimization of a bracket usingStructural weight optimization of a bracket using
Structural weight optimization of a bracket using
eSAT Publishing House
 
Harmonic reduction of cascaded mli fed induction
Harmonic reduction of cascaded mli fed inductionHarmonic reduction of cascaded mli fed induction
Harmonic reduction of cascaded mli fed induction
eSAT Publishing House
 
Factors that influence the success of hsr stations
Factors that influence the success of hsr stationsFactors that influence the success of hsr stations
Factors that influence the success of hsr stations
eSAT Publishing House
 
Design of workplace for the assembly of monoblock
Design of workplace for the assembly of monoblockDesign of workplace for the assembly of monoblock
Design of workplace for the assembly of monoblock
eSAT Publishing House
 
Analytical study of abutment and pile behaviour of iab with soil interaction
Analytical study of abutment and pile behaviour of iab with soil interactionAnalytical study of abutment and pile behaviour of iab with soil interaction
Analytical study of abutment and pile behaviour of iab with soil interaction
eSAT Publishing House
 
Enhancement of the performance of an industry by the
Enhancement of the performance of an industry by theEnhancement of the performance of an industry by the
Enhancement of the performance of an industry by the
eSAT Publishing House
 
A new approach on noise estimation of images
A new approach on noise estimation of imagesA new approach on noise estimation of images
A new approach on noise estimation of images
eSAT Publishing House
 
Comparative experimental study of simple absorber
Comparative experimental study of simple absorberComparative experimental study of simple absorber
Comparative experimental study of simple absorber
eSAT Publishing House
 
Performance evaluation of adaptive receivers for uwb
Performance evaluation of adaptive receivers for uwbPerformance evaluation of adaptive receivers for uwb
Performance evaluation of adaptive receivers for uwb
eSAT Publishing House
 
Bivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm forBivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm for
eSAT Publishing House
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
eSAT Publishing House
 
Wireless server for total healthcare system for clients
Wireless server for total healthcare system for clientsWireless server for total healthcare system for clients
Wireless server for total healthcare system for clients
eSAT Publishing House
 

Viewers also liked (20)

5 s implementation and its effect on physical workload
5 s implementation and its effect on physical workload5 s implementation and its effect on physical workload
5 s implementation and its effect on physical workload
 
Transient stability analysis of distributed generation
Transient stability analysis of distributed generationTransient stability analysis of distributed generation
Transient stability analysis of distributed generation
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manets
 
Enhancing minimal virtual machine migration in cloud environment
Enhancing minimal virtual machine migration in cloud environmentEnhancing minimal virtual machine migration in cloud environment
Enhancing minimal virtual machine migration in cloud environment
 
Implementation of sql server based on sqlite engine on
Implementation of sql server based on sqlite engine onImplementation of sql server based on sqlite engine on
Implementation of sql server based on sqlite engine on
 
A novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technologyA novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technology
 
Characteristic orthogonal polynimial application to galerkin indirect variati...
Characteristic orthogonal polynimial application to galerkin indirect variati...Characteristic orthogonal polynimial application to galerkin indirect variati...
Characteristic orthogonal polynimial application to galerkin indirect variati...
 
Potential utilisation of untreatedtreated textile effluent in concrete
Potential utilisation of untreatedtreated textile effluent in concretePotential utilisation of untreatedtreated textile effluent in concrete
Potential utilisation of untreatedtreated textile effluent in concrete
 
Structural weight optimization of a bracket using
Structural weight optimization of a bracket usingStructural weight optimization of a bracket using
Structural weight optimization of a bracket using
 
Harmonic reduction of cascaded mli fed induction
Harmonic reduction of cascaded mli fed inductionHarmonic reduction of cascaded mli fed induction
Harmonic reduction of cascaded mli fed induction
 
Factors that influence the success of hsr stations
Factors that influence the success of hsr stationsFactors that influence the success of hsr stations
Factors that influence the success of hsr stations
 
Design of workplace for the assembly of monoblock
Design of workplace for the assembly of monoblockDesign of workplace for the assembly of monoblock
Design of workplace for the assembly of monoblock
 
Analytical study of abutment and pile behaviour of iab with soil interaction
Analytical study of abutment and pile behaviour of iab with soil interactionAnalytical study of abutment and pile behaviour of iab with soil interaction
Analytical study of abutment and pile behaviour of iab with soil interaction
 
Enhancement of the performance of an industry by the
Enhancement of the performance of an industry by theEnhancement of the performance of an industry by the
Enhancement of the performance of an industry by the
 
A new approach on noise estimation of images
A new approach on noise estimation of imagesA new approach on noise estimation of images
A new approach on noise estimation of images
 
Comparative experimental study of simple absorber
Comparative experimental study of simple absorberComparative experimental study of simple absorber
Comparative experimental study of simple absorber
 
Performance evaluation of adaptive receivers for uwb
Performance evaluation of adaptive receivers for uwbPerformance evaluation of adaptive receivers for uwb
Performance evaluation of adaptive receivers for uwb
 
Bivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm forBivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm for
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
 
Wireless server for total healthcare system for clients
Wireless server for total healthcare system for clientsWireless server for total healthcare system for clients
Wireless server for total healthcare system for clients
 

Similar to A model to find the agent who responsible for data leakage

Data Leakage Detection
Data Leakage DetectionData Leakage Detection
Data Leakage Detection
Ashwini Nerkar
 
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
Drog3
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detectionChaitanya Kn
 
83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt
naresh2004s
 
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in OrganizationsA Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
IOSR Journals
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionkalpesh1908
 
Modeling and Detection of Data Leakage Fraud
Modeling and Detection of Data Leakage FraudModeling and Detection of Data Leakage Fraud
Modeling and Detection of Data Leakage Fraud
IOSR Journals
 
Bh32379384
Bh32379384Bh32379384
Bh32379384
IJERA Editor
 
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET Journal
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
Mohit Pandey
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
IJECEIAES
 
Anonymity based privacy-preserving data
Anonymity based privacy-preserving dataAnonymity based privacy-preserving data
Anonymity based privacy-preserving data
Kamal Spring
 
Misconduct disclosure of the intermediates using the trusted authority
Misconduct disclosure of the intermediates using the trusted authorityMisconduct disclosure of the intermediates using the trusted authority
Misconduct disclosure of the intermediates using the trusted authority
eSAT Publishing House
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and Sharing
IRJET Journal
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
redpel dot com
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
Pvrtechnologies Nellore
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
 

Similar to A model to find the agent who responsible for data leakage (20)

Data Leakage Detection
Data Leakage DetectionData Leakage Detection
Data Leakage Detection
 
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detection
 
83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt
 
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in OrganizationsA Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
 
Sub1555
Sub1555Sub1555
Sub1555
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Modeling and Detection of Data Leakage Fraud
Modeling and Detection of Data Leakage FraudModeling and Detection of Data Leakage Fraud
Modeling and Detection of Data Leakage Fraud
 
Bh32379384
Bh32379384Bh32379384
Bh32379384
 
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation Forest
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
547 551
547 551547 551
547 551
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
 
Anonymity based privacy-preserving data
Anonymity based privacy-preserving dataAnonymity based privacy-preserving data
Anonymity based privacy-preserving data
 
Misconduct disclosure of the intermediates using the trusted authority
Misconduct disclosure of the intermediates using the trusted authorityMisconduct disclosure of the intermediates using the trusted authority
Misconduct disclosure of the intermediates using the trusted authority
 
Secure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and SharingSecure Multimedia Content Protection and Sharing
Secure Multimedia Content Protection and Sharing
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
709 713
709 713709 713
709 713
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 

Recently uploaded (20)

RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 

A model to find the agent who responsible for data leakage

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 151 A MODEL TO FIND THE AGENT WHO RESPONSIBLE FOR DATA LEAKAGE Bhagwan D. Thorat1 , P. R. Devale2 1 Research Scholar, M-Tech Information Technology, BVDUCOEP, Maharashtra, India 2 Professor, Information Technology, BVDUCOEP, Maharashtra, India Abstract In this research paper, we implement the model to find the agent who responsible for data leakage system. The data leakage is one type of risk. Many times distributor sends some important data to two or more agents, but several times the information is disclosure and found unauthorized place or unauthorized person. The multiple ways to distributed important information i.e. e- mail, web site, FTP, databases, disk, spreadsheet etc. Due to this purpose information accessing in a safe way is become new topic of research and it became a contestant part to finding leakages. In this work we implement a system for distributing information to agents. In this method we add fake object to the distributed original data to the agent in such a way that improves the changes to finding a leakage. If agent sends this sensitive data to unauthorized person then distributor can receive one data leaked SMS, after that distributor can find the guilty agent who leaked the data. Keywords: Significant data, fake data, guilty agent. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Information leakage detection is one of the most significant issues in corporate dealing mainly in current trend. In corporate business companies share client information with each other who are in association with that companies. In this situation information security is significant so information leakage detection will play important role. Companies send or handed over the important information to trusted agent. For example in research center some scientist can share important new research information to each other through trusted agents. Similarly another enterprise may outsource its information processing so information must be given to lots of other partner’s. Usually information leakage finding is handled by watermarking. E.g. an exclusive code is embedded in each agent copy. If that copy finds an unauthorized person the guilty agent can be identified. It is very useful in certain cases, but again involves some alterations of the original data. In this model we solve the drawback of watermarking using data leakage detection system. In this paper we develop a model to finding the agent who is responsible for data leakage detection system. We develop the model using the C sharp dot net technology to implement the model and use SQL server as database for backend support to store all information. In this model the agent send request to distributor for the data and distributor sends data back to agent by adding fake object in that data. If any one of the agents cheats the distributor by sending the data to unauthorized person, the distributor can detect who is guilty agent using guilty agent model. 2. PRECEDING SYSTEM In the existing system usually information leakage detection is handled by the watermarking technology. E.g. an exclusive code is embedded in each agent copy. If those copies find an unauthorized person the guilty agent or leaker can be identified. It is very useful technology. In watermark system one drawback is that sometimes original data can change or deleted. 3. PROJECTED SYSTEM In the previous system watermarking technique is used. In this watermark technique a code is embedded in each agent copy and that code is find out to another unauthorized person then we decided the data was leaked but in watermarking system one drawback is that some time original data is changed. This drawback will be overcome to the data leakage detection system using fake object concept. In this projected system our aim is that to detect the administrator’s sensitive information has been leaked by the trusted agent and possible to identify the person who leaked the information. The data leakage detection system is a very convenient method where the information is changed by adding the fake object to the original data before handover to the agent or trusted third party. Now we develop one method in this system to assess the guilty agent. We also using one new algorithm to this technique is that suppose agent send the request to the distributor for the data and distributor sends data back to agent by adding fake object in that original data and suppose any one of the agent cheats the distributors by sending the information to unauthorized person the distributor received one message that your data is leaked. After that distributor can detect who is guilty agent using guilt agent model and decide the fraud person along with the probability. A graph is used to display the probability of agent who leaked the data maximum time.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 152 4. IMPLEMENTATION PLAN In this application we try to develop a model to finding the agent who is responsible for data leakage detection system. We develop the model using the C sharp dot net technology and Microsoft SQL server as database for backend support to store the file name, file path and fake object information for future reference when the distributor sends a file to agent. Same as when agent sends a file to unauthorized agent the sequence is store in the database and using this database the distributor received message that your data is leaked. After that we can find the guilty agent using guilt agent model. 5. MODULE DESCRIPTION A) Login-Registration Module:-This module is specially implemented to provide the authority to agent and distributor to access the other modules of the project and also use new registration of agent. B) Data Send Module:-This module is specially implemented to handover information from administrator to agents and same module used for transfer data from agent to unauthorized agents. C) Manage Users Module:-This module is specially designed to approve the new registered agent. D) Upload Article:-This module is specially designed to upload the new data. E) Guilt Agent Module:-This module is specially designed to identify the guilty agent. This module checks the fake object in leaked data and determines the guilty agent and decides the fraud person along with the probability. A graph is used to display the probability of agent who leaked the data maximum time. Algorithm 1. Start 2. Agent send request to distributor for data. R= {R1, R2, ………Rn} REC= {r1, r2, …….rm} F={F1, F2, …….Fz} 3. Distributor select agent to send data. M= {M1, M2, …….Mn} The distributor select agents and gives requested data R1, R2 to agents. 4. Distributors creates fake object & allocates it to the agents randomly. 5. Now the distributor checks how many agents have already received data. 6. Distributor checks remaining agents. 7. Distributor chooses remaining agents to send data. 8. Find the guilty agent and calculate the probability for guilt agent to compute this probability we need to find by the guilty agents. 9. Stop. 6. RESULT Fig1. Login Page Fig2. Home Page Fig3. Send Request page Fig4. Send Data Page
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 153 Fig5. Guilty Agent Detection Module page Fig-6. Calculate probability for Guilty agent 7. CONCLUSION When a distributors necessity to send sensitive information to a trusted agents, it is needed to monitoring on the distribution process. When sensitive information has to be send through trusted agents the chances to leak the data is increased. In this research paper we try to solve this problem using fake object method. In this method when agent send request to distributor for the data and distributor send data back to agent by adding fake object in that original data. If any one of the agent cheats the distributor by sending the data to unauthorized person the distributor can detects who is guilty agent using guilty agent module. In this module distributor can browse the leaked data and find out the guilty agent ID and name by using fake object. We implement algorithm that are having data allocation method for enhancing the probabilities of distributor can identifying the leaker. REFERENCES [1]. Panagiotis Papadimitriou, Hector Garcia-Molina “A Model for Data Leakage Detection.” Stanford University 353 serra street, Stanford, CA 94305, USA. [2]. Bhagwan D. Thorat, P. R. Devale “Identifying Guilty Agent for Data Leakage Detection System.” International Journal of Advance Research in Computer Science and Management Studies. Volume 2, Issue 3, March 2014. [3]. Shreyta Raj, Ravinder Purwar, Ashutosh Dangwal “A Model for identifying Guilty Agents in Data Transmission." International Journal of Advanced Research in Computer Engg. & Technology. Vol. 1, Issue 4, June 2012. [4]. Y. Jagadeesh Kumar, M Chinna Rao. “Unauthorized Data Access Detection by Insertion of Duplicate Data Records.” IJRCCT, Vol. 1, Issue 7, December 2012. [5]. Sridhar gade, Kiran Kumar Munde, Krishnaiah R. V. “ Data Allocation Strategies for Leakage Detection.” IOSR Journal for Computer Engg. Vol 5, Issue 2, Sep-Oct. 2012. [6]. R. Arul Murugan, Kavitha. E, Nivedha. M, Subashini. S “Data Leakage Detection and Prevention Using Perturbation and Unobtrusive Analyzes.” International Journal of Communications and Engineering. Vol 4, Issue 3, March 2012. BIOGRAPHIES Bhagwan D. Thorat, B.E. Computer Engineering, Pursuing M-Tech Information Technology in Bharati Vidyapeeth Deemed University College of Engineering, Pune, Maharashtra, India. Prakash R. Devale, M.E. Computer Engg, Pursuing Ph. D in Bharati Vidyapeeth University, Pune, Maharashtra, India. Currently working as Professor in the Department of Information Technology. Bharati Vidyapeeth Deemed University College of Engineering, Pune, Maharashtra, India.