Data Leakage Detection: Team Members
Data Leakage Detection: Team Members
Team Guide :
B.Sivanandhan
(AP/CSE)
Team members:
S.VIJAYAKUMAR
T.DINESHCHANDRAN
R.GOBINATH
K.BARATHKUMAR
INTRODUCTION
EXISTING SYSTEM
PROPOSED SYSTEM
ARCHITECTURE DIAGRAM
IMPLEMENTATIONS
CONCLUSION
INTRODUCTIO
N
In the course of doing
business, sometimes
sensitive data must be
handed over to supposedly
trusted third parties.
Our goal is to detect when
the distributor's sensitive
data has been leaked by
agents, and if possible to
identify the agent that
leaked the data.
EXISTING SYSTEM
WATERMARKING
PROPOSED SYSTEM
PROPOSED SYSTEM
MODULES
Data Allocation Module
Fake Object Module
Optimization Module
Data Distributor Module
Agent Guilt Module
Optimization Module
The Optimization Module is the distributors
data allocation to agents has one constraint and one
objective. The agents constraint is to satisfy distributors
requests, by providing them with the number of objects
they request or with all available objects that satisfy their
conditions. His objective is to be able to detect an agent
who leaks any portion of his data. User can able to lock
and unlock the files for secure.
ARCHITECTURE DIAGRAM:
The Sent e-mail
dont contains fake
Object/Watermarks.
Internet
Internet
Implementation
The system has the following
Data Allocation
-- approach same as watermarking
-- less sensitive
-- add fake object in some cases
Fake Object
-- Are real looking object
-- Should not affect data
-- Limit on fake object insertion(e-mail inbox)
-- CREATEFAKEOBJECT (Ri, Fi, CONDi)
CONCLUSION
In the real scenario there is no need to hand over the sensitive data
to the agents who will unknowingly or maliciously leak it.
However, in many cases, we must indeed work with agents that may
not be 100 percent trusted, and we may not be certain if a leaked
object came from an agent or from some other source.
In spite of these difficulties, it is possible to assess the likelihood that
an agent is responsible for a leak, based on the overlap of his data
with the leaked data .
The algorithms we have presented implement a variety of data
distribution strategies that can improve the distributors chances of
identifying a leaker.