Data 1
Data 1
The aim of the project is to overcome data allocation problem and to send
secured data for third party agent. Our goal is detect when the distributor’s sensitive
data has been leaked by agents, and if possible to identify the agent that leaked the
data. We develop unobtrusive techniques for detecting leakage of a set of objects or
records.
Watermarks can be very useful in some cases, but again, involve some
modification of the original data. Furthermore, watermarks can sometimes be
destroyed if the data recipient is malicious.
E.g. A hospital may give patient records to researchers who will devise new
treatments. Similarly, a company may have partnerships with other companies
that require sharing customer data.
Another enterprise may outsource its data processing, so data must be given
to various other companies. We call the owner of the data the distributor and
the supposedly trusted third parties the agents.
PROPOSED SYSTEM:
Our goal is to detect when the distributor’s sensitive data has been leaked by agents,
and if possible to identify the agent that leaked the data. Perturbation is a very useful
technique where the data is modified and made “less sensitive” before being handed to
agents. we develop unobtrusive techniques for detecting leakage of a set of objects or
records.
In this section we develop a model for assessing the “guilt” of agents. We also present
algorithms for distributing objects to agents, in a way that improves our chances of
identifying a leaker.
Finally, we also consider the option of adding “fake” objects to the distributed set.
Such objects do not correspond to real entities but appear realistic to the agents.
In a sense, the fake objects acts as a type of watermark for the entire set, without
modifying any individual members. If it turns out an agent was given one or more fake
objects that were leaked, then the distributor can be more confident that agent was
guilty.
Advantage Proposed System:-
We can provide security to our data during its distribution or
transmission and even we can detect if that gets leaked
we have presented implement a variety of data distribution strategies
that can improve the distributor’s chances of identifying a leaker
Quick response time
Customized processing
Small memory factor
Highly secure
Replication in Heterogenic Database
Easy updating.
Distribution Strategies
Sample Data Requests Explicit Data Requests
The distributor must provide
• The distributor has the freedom
agents with the data they
to select the data items to
request
provide the agents with
General Idea:
• General Idea:
Add fake data to the
– Provide agents with as much
distributed ones to minimize
disjoint sets of data as
overlap of distributed data
possible
Problem: Agents can collude and
• Problem: There are cases where
identify fake data
the distributed data must
NOT COVERED in this talk
overlap E.g., |Ri|+…+|Rn|>|T|
Algorithm:
The AES algorithm is based on permutations and substitutions. Permutations are
rearrangements of data, and substitutions replace one unit of data with another. AES performs
permutations and substitutions using several different techniques. The four operations Sub
Bytes, Shift Rows, Mix Columns, and Add Round Key are called inside a loop that executes
Nr times—the number of rounds for a given key size, less 1. The number of rounds that the
encryption algorithm uses is 10, 12, or 14 and depends on whether the seed key size is 128,
192, or 256 bits.
Allocation for Explicit Data Requests: In this request the agent will send the request with
appropriate condition. Agent gives the input as request with input as well as the
condition for the request after processing the data after processing on the data the gives
the data to agent by adding fake object with an encrypted format.
Allocation for Sample Data Requests: In this request agent request does not have
condition. The agent sends the request without condition as agent sends the request
without condition as per his query he will get the data. the distributor can assess the
likelihood that the leaked data came from one or more agents, as opposed to having
been independently gathered by other means. We develop a model for assessing the
“guilt” of agents.
HARDWARE & SOFTWARE REQUIREMENT
H/W System Configuration:-
Processor - intel core i3
Speed - 1.1Ghz
RAM - 256 MB
Hard Disk - 20 GB
4. Data Distributor:
A data distributor has given sensitive data to a set of supposedly
trusted agents (third parties). Some of the data is leaked and found in an
unauthorized place (e.g., on the web or somebody’s laptop). The distributor
must assess the likelihood that the leaked data came from one or more agents,
as opposed to having been independently gathered by other means . Admin
can able to view the which file is leaking and fake user’s details also.
Flowchart: Start
User Login
Admin Client
Authentication
Stop
0-Level DFD
Distributor
Data
User/ Leakage Admin
Client
Detection
Database
1-Level DFD
Third Party
Client Request data Distributor
(Implicit or Explicit) (send Data)
Distribution
Category and
Fake Objects
Gather Leak
Find out Data leakage Data
guilt agent detection algorithm
Applications
Secure file transfers
Image Transmissions security
Video transfer security
Conclusion:
The leakages are identified using the traditional
technique of watermarking,certain data cannot admit
watermark.