SlideShare a Scribd company logo
1 of 26
Submitted by:
SUVEEKSHA JAIN
Mtech I Sem
SJEC
 Data leakage is the unauthorized transmission of
sensitive data or information from within an
organization to an external destination or recipient.
 Sensitive data of companies and organization
includes
 intellectual property,
 financial information ,
 patient information,
 personal credit card data ,
and other information depending upon the business and the
industry.
 In the course of doing business, sometimes data must
be handed over to trusted third parties for some
enhancement or operations.
 Sometimes these trusted third parties may act as
points of data leakage.
 Example:
a) A hospital may give patient records to researcher who
will devise new treatments.
b) A company may have partnership with other
companies that require sharing of customer data.
c) An enterprise may outsource its data processing , so
data must be given to various other companies.
Development chains
Supply chains Outsourcing
Business hubs
Demand chains
Sept. 2011 Science Applications
International Corp
Backup tapes stolen from a car
containing 5,117,799 patients’
names, phone numbers ,Social
Security numbers, and medical
information.
July 2008 Google Data were stolen, not from
Google offices, but from the
headquarters of an HR
outsourcing company ,Colt
Express.
July 2009 American Express DBA stole a laptop containing
thousands of American Express
card numbers. The DBA
reported it stolen
Aug. 2007 Nuclear Laboratory
in Los Alamos
An employee of the U.S. nuclear
laboratory in Los Alamos
transmitted confidential
information by email.
Data leakage incidents
 Owner of data is termed as the distributor
and the third parties are called as the
agents .
 In case of data leakage, the distributor must
assess the likelihood that the leaked data
came from one or more agents, as opposed
to having been independently gathered by
other means.
SYSTEM DIAGRAM
Watermarking
Overview:
A unique code is embedded in each distributed
copy. If that copy is later discovered in the hands of an
unauthorized party, the leaker can be identified.
Mechanism:
The main idea is to generate a watermark [W(x; y)]
using a secret key chosen by the sender such that W(x;
y) is indistinguishable from random noise for any
entity that does not know the key (i.e., the recipients).
 The sender adds the watermark W(x; y) to the
information object I(x; y) and thus forms a transformed
object TI(x; y) before sharing it with the recipient(s).
 It is then hard for any recipient to guess the
watermark W(x; y) (and subtract it from the
transformed object TI(x; y));
 The sender on the other hand can easily extract and
verify a watermark (because it knows the key).
 It involves some modification of data that is making
the data less sensitive by altering attributes of the data.
 The second problem is that these watermarks can be
sometimes destroyed if the recipient is malicious.
 Using data allocation strategies, the distributer give
data to agents in order to improve the chances of
detecting guilty agents.
 Fake object is added to identify the guilty party.
 Distributer will be more confident when data leaked
by agents and they may stop doing business with him.
ARCHITECTURAL VIEW OF
THE SYSTEM
Thus we need a data leakage detection technique which fulfils
the following objective and abides by the given constraint.
CONSTRAINT
To satisfy agent requests by providing them with the number
of objects they request or with all available objects that satisfy their
conditions.
Avoid perturbation of original data before handing it to agents
OBJECTIVE
To be able to detect an agent who leaks any portion of his
data.
Different WaterMarking system:
 Embedding and extraction
 Secure speed spectrum Watermarking
 DCT-Based Watermarking
 Speed spectrum
 Wavelet based Watermarking
 Robust watermarking technique
 Invisible watermarking
 Watermarking of digital audio and image using Matlab
 Watermarking while preserving the critical path
 Buyer seller watermarking protocols
 Watermarking using cellular automata transform
 Fragile watermarking
 Data Allocation Module
 Fake Object Module
 Data Distributor Module
 Agent guilt Module
 Data Allocation: The main focus of our project is the
data allocation problem as how can the distributor
“intelligently” give data to agents in order to improve
the chances of detecting a guilty agent.
 Fake Object: Fake objects are objects generated by the
distributor in order to increase the chances of detecting
agents that leak data. The distributor may be able to add
fake objects to the distributed data in order to improve
his effectiveness in Detecting guilty agents. Our use of
fake objects is inspired by the use of “trace” records in
mailing lists.
 Data Distributor: A data distributor has given sensitive data to
a set of Supposedly trusted agents (third parties). Some of the
data is leaked and found in an unauthorized place (e.g., on the
web or somebody’s laptop). The distributor must assess the
likelihood that the leaked data came from one or more agents,
as opposed to having been independently gathered by other
means.
 Agent guilt: To compute prfgiijsg,we need an estimate for
the probability that values in S can be “guessed”by target.
 Cloud is large group of interconnected computers.
Any authorized user can access these apps from any
computer over internet.
Key properties of cloud computing:
 User centric
 Task centric
 Powerful
 Accessible
 Intelligent
 programmable
 Right protection is provided for relational data
 Watermarking technique for multimedia data
 Achieving K-Anonymity Privacy Protection
 Watermarking the relational databses
 Lineage tracing general data warehouse
transformations
 The presented strategies assume that there is a fixed
set of agents with requests known in advance.
 The distributor may have a limit on the number of fake
objects.
 Cloud computing technology enables data to be stored
in the cloud and enables users both inside and outside
the company to access the same data which increases
the usefulness of data
 It helps in detecting whether the distributor’s sensitive
data has been leaked by the trustworthy or authorized
agents.
 It helps to identify the agents who leaked the data.
 Reduces cybercrime.
 Though the leakers are identified using the traditional
technique of watermarking, certain data cannot admit
watermarks.
 In spite of these difficulties, it is possible to assess the
likelihood that an agent is responsible for a leak.
 We observed that distributing data judiciously can make a
significant difference in identifying guilty agents using the
different data allocation strategies.
Data leakage detection

More Related Content

What's hot

Data leakage detection (synopsis)
Data leakage detection (synopsis)Data leakage detection (synopsis)
Data leakage detection (synopsis)Mumbai Academisc
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionMohit Pandey
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
Fast detection of transformed data leaks[mithun_p_c]
Fast detection of transformed data leaks[mithun_p_c]Fast detection of transformed data leaks[mithun_p_c]
Fast detection of transformed data leaks[mithun_p_c]MithunPChandra
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolsN.Jagadish Kumar
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data miningDataminingTools Inc
 
Dynamic storage allocation techniques in Compiler design
Dynamic storage allocation techniques in Compiler designDynamic storage allocation techniques in Compiler design
Dynamic storage allocation techniques in Compiler designkunjan shah
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptxGulnurAzat
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigationedwardbel
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 
Data Security
Data SecurityData Security
Data SecurityAkNirojan
 
Web application attacks
Web application attacksWeb application attacks
Web application attackshruth
 
Anti forensic
Anti forensicAnti forensic
Anti forensicMilap Oza
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanismspriya_trehan
 

What's hot (20)

Data leakage detection (synopsis)
Data leakage detection (synopsis)Data leakage detection (synopsis)
Data leakage detection (synopsis)
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Fast detection of transformed data leaks[mithun_p_c]
Fast detection of transformed data leaks[mithun_p_c]Fast detection of transformed data leaks[mithun_p_c]
Fast detection of transformed data leaks[mithun_p_c]
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Dynamic storage allocation techniques in Compiler design
Dynamic storage allocation techniques in Compiler designDynamic storage allocation techniques in Compiler design
Dynamic storage allocation techniques in Compiler design
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
 
Database security
Database securityDatabase security
Database security
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Data Security
Data SecurityData Security
Data Security
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Anti forensic
Anti forensicAnti forensic
Anti forensic
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Mobile security
Mobile securityMobile security
Mobile security
 

Viewers also liked

Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionrejii
 
American Leak Detection - Description of Services
American Leak Detection - Description of ServicesAmerican Leak Detection - Description of Services
American Leak Detection - Description of ServicesJoshua Butler
 
Neural network journal by Engr. Edgar Carrillo II
Neural network journal by Engr. Edgar Carrillo IINeural network journal by Engr. Edgar Carrillo II
Neural network journal by Engr. Edgar Carrillo IIEdgar Carrillo
 
Wireless languages and content generation technologies
Wireless languages and content generation technologiesWireless languages and content generation technologies
Wireless languages and content generation technologiesSuveeksha
 
Simulation of Natural Gas leak detection system using AI
Simulation of Natural Gas leak detection system using AISimulation of Natural Gas leak detection system using AI
Simulation of Natural Gas leak detection system using AIEdgar Carrillo
 
Development of underwater quality and natural gas leak detection system using...
Development of underwater quality and natural gas leak detection system using...Development of underwater quality and natural gas leak detection system using...
Development of underwater quality and natural gas leak detection system using...Edgar Carrillo
 
Gail(india) limited
Gail(india) limitedGail(india) limited
Gail(india) limitedabhigaur91
 
Open mp library functions and environment variables
Open mp library functions and environment variablesOpen mp library functions and environment variables
Open mp library functions and environment variablesSuveeksha
 
B. basic of vibration
B. basic of vibrationB. basic of vibration
B. basic of vibrationDương Phúc
 
Study Of The Fault Diagnosis Based On Wavelet And Fuzzy Neural Network For Th...
Study Of The Fault Diagnosis Based On Wavelet And Fuzzy Neural Network For Th...Study Of The Fault Diagnosis Based On Wavelet And Fuzzy Neural Network For Th...
Study Of The Fault Diagnosis Based On Wavelet And Fuzzy Neural Network For Th...IJRES Journal
 
Vibration analysis at thermal power plants
Vibration analysis at thermal power plantsVibration analysis at thermal power plants
Vibration analysis at thermal power plantsSHIVAJI CHOUDHURY
 
Condition monitoring of rotating machines ppt
Condition monitoring of rotating machines pptCondition monitoring of rotating machines ppt
Condition monitoring of rotating machines pptRohit Kaushik
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedSlideShare
 

Viewers also liked (15)

Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
American Leak Detection - Description of Services
American Leak Detection - Description of ServicesAmerican Leak Detection - Description of Services
American Leak Detection - Description of Services
 
web services
web servicesweb services
web services
 
Neural network journal by Engr. Edgar Carrillo II
Neural network journal by Engr. Edgar Carrillo IINeural network journal by Engr. Edgar Carrillo II
Neural network journal by Engr. Edgar Carrillo II
 
Wireless languages and content generation technologies
Wireless languages and content generation technologiesWireless languages and content generation technologies
Wireless languages and content generation technologies
 
Simulation of Natural Gas leak detection system using AI
Simulation of Natural Gas leak detection system using AISimulation of Natural Gas leak detection system using AI
Simulation of Natural Gas leak detection system using AI
 
Development of underwater quality and natural gas leak detection system using...
Development of underwater quality and natural gas leak detection system using...Development of underwater quality and natural gas leak detection system using...
Development of underwater quality and natural gas leak detection system using...
 
Gail(india) limited
Gail(india) limitedGail(india) limited
Gail(india) limited
 
Open mp library functions and environment variables
Open mp library functions and environment variablesOpen mp library functions and environment variables
Open mp library functions and environment variables
 
B. basic of vibration
B. basic of vibrationB. basic of vibration
B. basic of vibration
 
Study Of The Fault Diagnosis Based On Wavelet And Fuzzy Neural Network For Th...
Study Of The Fault Diagnosis Based On Wavelet And Fuzzy Neural Network For Th...Study Of The Fault Diagnosis Based On Wavelet And Fuzzy Neural Network For Th...
Study Of The Fault Diagnosis Based On Wavelet And Fuzzy Neural Network For Th...
 
Vibration analysis at thermal power plants
Vibration analysis at thermal power plantsVibration analysis at thermal power plants
Vibration analysis at thermal power plants
 
Condition monitoring of rotating machines ppt
Condition monitoring of rotating machines pptCondition monitoring of rotating machines ppt
Condition monitoring of rotating machines ppt
 
Presentation on Condition Monitoring
Presentation on Condition MonitoringPresentation on Condition Monitoring
Presentation on Condition Monitoring
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Similar to Data leakage detection

Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdfData leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdfnaresh2004s
 
dataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptxdataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptxnaresh2004s
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
Dn31538540
Dn31538540Dn31538540
Dn31538540IJMER
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionAjitkaur saini
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionbunnz12345
 
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdfDrog3
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET Journal
 
83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.pptnaresh2004s
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePvrtechnologies Nellore
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Brianna Johnson
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposureredpel dot com
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityIGEEKS TECHNOLOGIES
 
Contractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataContractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataDigital Shadows
 
Jpdcs1(data lekage detection)
Jpdcs1(data lekage detection)Jpdcs1(data lekage detection)
Jpdcs1(data lekage detection)Chaitanya Kn
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
 
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionData Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionIOSR Journals
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Miningwanani181
 
Cloud computing
Cloud computingCloud computing
Cloud computingAli Raza
 

Similar to Data leakage detection (20)

Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdfData leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
 
dataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptxdataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptx
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Dn31538540
Dn31538540Dn31538540
Dn31538540
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
Contractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataContractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive Data
 
Jpdcs1(data lekage detection)
Jpdcs1(data lekage detection)Jpdcs1(data lekage detection)
Jpdcs1(data lekage detection)
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionData Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage Detection
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Mining
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 

Data leakage detection

  • 2.  Data leakage is the unauthorized transmission of sensitive data or information from within an organization to an external destination or recipient.  Sensitive data of companies and organization includes  intellectual property,  financial information ,  patient information,  personal credit card data , and other information depending upon the business and the industry.
  • 3.  In the course of doing business, sometimes data must be handed over to trusted third parties for some enhancement or operations.  Sometimes these trusted third parties may act as points of data leakage.  Example: a) A hospital may give patient records to researcher who will devise new treatments. b) A company may have partnership with other companies that require sharing of customer data. c) An enterprise may outsource its data processing , so data must be given to various other companies.
  • 4. Development chains Supply chains Outsourcing Business hubs Demand chains
  • 5. Sept. 2011 Science Applications International Corp Backup tapes stolen from a car containing 5,117,799 patients’ names, phone numbers ,Social Security numbers, and medical information. July 2008 Google Data were stolen, not from Google offices, but from the headquarters of an HR outsourcing company ,Colt Express. July 2009 American Express DBA stole a laptop containing thousands of American Express card numbers. The DBA reported it stolen Aug. 2007 Nuclear Laboratory in Los Alamos An employee of the U.S. nuclear laboratory in Los Alamos transmitted confidential information by email. Data leakage incidents
  • 6.  Owner of data is termed as the distributor and the third parties are called as the agents .  In case of data leakage, the distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means.
  • 8. Watermarking Overview: A unique code is embedded in each distributed copy. If that copy is later discovered in the hands of an unauthorized party, the leaker can be identified. Mechanism: The main idea is to generate a watermark [W(x; y)] using a secret key chosen by the sender such that W(x; y) is indistinguishable from random noise for any entity that does not know the key (i.e., the recipients).
  • 9.  The sender adds the watermark W(x; y) to the information object I(x; y) and thus forms a transformed object TI(x; y) before sharing it with the recipient(s).  It is then hard for any recipient to guess the watermark W(x; y) (and subtract it from the transformed object TI(x; y));  The sender on the other hand can easily extract and verify a watermark (because it knows the key).
  • 10.  It involves some modification of data that is making the data less sensitive by altering attributes of the data.  The second problem is that these watermarks can be sometimes destroyed if the recipient is malicious.
  • 11.  Using data allocation strategies, the distributer give data to agents in order to improve the chances of detecting guilty agents.  Fake object is added to identify the guilty party.  Distributer will be more confident when data leaked by agents and they may stop doing business with him.
  • 13. Thus we need a data leakage detection technique which fulfils the following objective and abides by the given constraint. CONSTRAINT To satisfy agent requests by providing them with the number of objects they request or with all available objects that satisfy their conditions. Avoid perturbation of original data before handing it to agents OBJECTIVE To be able to detect an agent who leaks any portion of his data.
  • 14. Different WaterMarking system:  Embedding and extraction  Secure speed spectrum Watermarking  DCT-Based Watermarking  Speed spectrum  Wavelet based Watermarking  Robust watermarking technique  Invisible watermarking  Watermarking of digital audio and image using Matlab  Watermarking while preserving the critical path  Buyer seller watermarking protocols  Watermarking using cellular automata transform
  • 16.
  • 17.  Data Allocation Module  Fake Object Module  Data Distributor Module  Agent guilt Module
  • 18.  Data Allocation: The main focus of our project is the data allocation problem as how can the distributor “intelligently” give data to agents in order to improve the chances of detecting a guilty agent.  Fake Object: Fake objects are objects generated by the distributor in order to increase the chances of detecting agents that leak data. The distributor may be able to add fake objects to the distributed data in order to improve his effectiveness in Detecting guilty agents. Our use of fake objects is inspired by the use of “trace” records in mailing lists.
  • 19.  Data Distributor: A data distributor has given sensitive data to a set of Supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means.  Agent guilt: To compute prfgiijsg,we need an estimate for the probability that values in S can be “guessed”by target.
  • 20.  Cloud is large group of interconnected computers. Any authorized user can access these apps from any computer over internet. Key properties of cloud computing:  User centric  Task centric  Powerful  Accessible  Intelligent  programmable
  • 21.  Right protection is provided for relational data  Watermarking technique for multimedia data  Achieving K-Anonymity Privacy Protection  Watermarking the relational databses  Lineage tracing general data warehouse transformations
  • 22.  The presented strategies assume that there is a fixed set of agents with requests known in advance.  The distributor may have a limit on the number of fake objects.
  • 23.  Cloud computing technology enables data to be stored in the cloud and enables users both inside and outside the company to access the same data which increases the usefulness of data
  • 24.  It helps in detecting whether the distributor’s sensitive data has been leaked by the trustworthy or authorized agents.  It helps to identify the agents who leaked the data.  Reduces cybercrime.
  • 25.  Though the leakers are identified using the traditional technique of watermarking, certain data cannot admit watermarks.  In spite of these difficulties, it is possible to assess the likelihood that an agent is responsible for a leak.  We observed that distributing data judiciously can make a significant difference in identifying guilty agents using the different data allocation strategies.