0% found this document useful (0 votes)
31 views

Data Leakage Identification: Internal Guide

The document proposes a method called PAD (Probability Allocation Detection) to identify data leakage from agents given sensitive data by a distributor. The method allocates fake data objects across agents to analyze which agent is most likely to be the source if a leakage occurs. It describes allocating data to agents, analyzing leaked data to determine the probability of guilt for each agent, and identifying the most likely agent responsible for the leakage.

Uploaded by

Dharmesh Bharti
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

Data Leakage Identification: Internal Guide

The document proposes a method called PAD (Probability Allocation Detection) to identify data leakage from agents given sensitive data by a distributor. The method allocates fake data objects across agents to analyze which agent is most likely to be the source if a leakage occurs. It describes allocating data to agents, analyzing leaked data to determine the probability of guilt for each agent, and identifying the most likely agent responsible for the leakage.

Uploaded by

Dharmesh Bharti
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

DATA LEAKAGE IDENTIFICATION

BY PAD METHOD

INTERNAL GUIDE
Ms. KALAIMATHI B. Asst. Professor Dept of CSE, MVJCE

SUBMITTED BY
DHARMESH BHARTI PRADEEP L. SAVALKAR MOHAMMAD ASIF HASAN

Our goal is to detect when the distributors sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data.

A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages

1. 2. 3.

Data Distributor Data Allocation Module Finding Guilty Agents Module

Login

Data Transfer

Fake objects addition

Guilt Model Analysis Show the probability distribution of data leakage

Logout

LOGIN

DISTRIBUTE DATA TO AGENTS

VIEE DATA DISTRIBUTED TO AGENTS

FIND GUILT AGENTS FIND PROBABILITY OF DATA LEAKAGE

Signup Login Distribute Data to Agents

Distributor

View Data Distributed To Agents


Find Guilt Agents

Database
Find Probability

Agent
Receive Data From Distributor Transfer Data To Other Agents

DISTRIBUTOR LOGIN AUTHETICATE UPLOAD DATA VIEW DATA VIEW LEAKED DATA VIEW GUILTY AGENT

DATABASE

DISTRIBUTER

AGENTS

UNAUTHORIZED PARTY

DATA SENT WITH FAKE OBJECT

DATA SENT WITH FAKE OBJECT

ALERT !!!

CONFIRMATION

CHECK PIRACY PROTECT PERSONAL FILES

Once the guilt agent is found, he or she may stop doing business with him.

May initiate legal proceedings.

The investigation of agent guilt models that capture leakage scenarios.

Allocation strategies so that they can handle agent requests in an online fashion.

Panagiotis Papadimitriou, and Hector Garcia-Molina, Data Leakage Detection, IEEE Transactions on Knowledge and Data Engineering, Vol. 23, NO.1, January 2011. R. Agrawal and J. Kiernan. Watermarking relational databases. In VLDB 02: Proceedings of the 28th international conference on Very Large Data Bases, pages 155166. VLDB Endowment, 2002. P. Bonatti, S. D. C. di Vimercati, and P. Samarati. An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur., 5(1):135, 2002.

THANK YOU

You might also like