DATA LEAKAGE DETECTION
#1

[attachment=11824]
DATA LEAKAGE DETECTION
ABSTRACT

A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases we can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party.
OBJECTIVE
• A data distributor has given sensitive data to a set of supposedly trusted agents (third parties).
• Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop).
• The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means.
• We propose data allocation strategies (across the agents) that improve the probability of identifying leakages.
• These methods do not rely on alterations of the released data (e.g., watermarks). In some cases we can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party.
• Our goal is to detect when the distributor’s sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data.
EXISTING SYSTEM
• We consider applications where the original sensitive data cannot be perturbed. Perturbation is a very useful technique where the data is modified and made “less sensitive” before being handed to agents.
• However, in some cases it is important not to alter the original distributor’s data.
• Traditionally, leakage detection is handled by watermarking, e.g., a unique code is embedded in each distributed copy.
• If that copy is later discovered in the hands of an unauthorized party, the leaker can be identified.
• Watermarks can be very useful in some cases, but again, involve some modification of the original data.
• Furthermore, watermarks can sometimes be destroyed if the data recipient is malicious.
PROPOSED SYSTEM
• After giving a set of objects to agents, the distributor discovers some of those same objects in an unauthorized place.
• At this point the distributor can assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means.
• If the distributor sees “enough evidence” that an agent leaked data, he may stop doing business with him, or may initiate legal proceedings.
• In this project we develop a model for assessing the “guilt” of agents.
• We also present algorithms for distributing objects to agents, in a way that improves our chances of identifying a leaker.
• Finally, we also consider the option of adding “fake” objects to the distributed set. Such objects do not correspond to real entities but appear.
• If it turns out an agent was given one or more fake objects that were leaked, then the distributor can be more confident that agent was guilty.
CONCLUSION
The likelihood that an agent is responsible for a leak is assessed, based on the overlap of his data with the leaked data and the data of other agents, and based on the probability that objects can be “guessed” by other means. The algorithms we have presented implement a variety of data distribution strategies that can improve the distributor’s chances of identifying a leaker. We have shown that distributing objects judiciously can make a significant difference in identifying guilty agents, especially in cases where there is large overlap in the data that agents must receive.
Reply
#2
Rainbow 
Send pdf or doc about data leakage detection in novel networks
Reply
#3



To get more information about the topic "DATA LEAKAGE DETECTION " please refer the page link below
http://seminarsprojects.in/attachment.php?aid=11824

http://studentbank.in/report-data-leakag...ion--22106
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: explanation on data leakage detection and related viva projects, how create fake object for data leakage detection, literature review on data leakage, activity diagram in data leakage detection, leakage detection, advantages of data leakage detection advantages, advantages of data leakage detection ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A Link-Based Cluster Ensemble Approach for Categorical Data Clustering 1 1,062 16-02-2017, 10:51 AM
Last Post: jaseela123d
  Exploiting the Functional and Taxonomic Structure of Genomic Data by Probabilistic To 1 750 14-02-2017, 04:15 PM
Last Post: jaseela123d
  SUSPICIOUS EMAIL DETECTION seminar class 11 7,774 21-04-2016, 11:16 AM
Last Post: dhanabhagya
  Remote Server Monitoring System For Corporate Data Centers smart paper boy 3 2,806 28-03-2016, 02:51 PM
Last Post: dhanabhagya
  Secured Data Hiding and Extractions Using BPCS project report helper 4 3,644 04-02-2016, 12:52 PM
Last Post: seminar report asees
  Data Hiding in Binary Images for Authentication & Annotation project topics 2 1,812 06-11-2015, 02:27 PM
Last Post: seminar report asees
  DATA LEAKAGE DETECTION project topics 16 13,002 31-07-2015, 02:59 PM
Last Post: seminar report asees
  An Acknowledgement-Based Approach for the Detection of routing misbehavior in MANETs mechanical engineering crazy 2 2,941 26-05-2015, 03:04 PM
Last Post: seminar report asees
  An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs electronics seminars 7 4,671 27-01-2015, 12:09 AM
Last Post: Guest
  Privacy Preservation in Data Mining sajidpk123 3 2,929 13-11-2014, 10:48 PM
Last Post: jaseela123d

Forum Jump: