Data Leakage Identification: Internal Guide
Data Leakage Identification: Internal Guide
BY PAD METHOD
INTERNAL GUIDE
Ms. KALAIMATHI B. Asst. Professor Dept of CSE, MVJCE
SUBMITTED BY
DHARMESH BHARTI PRADEEP L. SAVALKAR MOHAMMAD ASIF HASAN
Our goal is to detect when the distributors sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data.
A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages
1. 2. 3.
Login
Data Transfer
Logout
LOGIN
Distributor
Database
Find Probability
Agent
Receive Data From Distributor Transfer Data To Other Agents
DISTRIBUTOR LOGIN AUTHETICATE UPLOAD DATA VIEW DATA VIEW LEAKED DATA VIEW GUILTY AGENT
DATABASE
DISTRIBUTER
AGENTS
UNAUTHORIZED PARTY
ALERT !!!
CONFIRMATION
Once the guilt agent is found, he or she may stop doing business with him.
Allocation strategies so that they can handle agent requests in an online fashion.
Panagiotis Papadimitriou, and Hector Garcia-Molina, Data Leakage Detection, IEEE Transactions on Knowledge and Data Engineering, Vol. 23, NO.1, January 2011. R. Agrawal and J. Kiernan. Watermarking relational databases. In VLDB 02: Proceedings of the 28th international conference on Very Large Data Bases, pages 155166. VLDB Endowment, 2002. P. Bonatti, S. D. C. di Vimercati, and P. Samarati. An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur., 5(1):135, 2002.
THANK YOU