SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
ISSN: 2278 – 1323
       International Journal of Advanced Research in Computer Engineering & Technology
                                                           Volume 1, Issue 4, June 2012


           EVALUATE FAKE OBJECTS TO PREDICTS
             UNAUTHENTICATED DEVELOPERS

A. Santhi Lakshmi                                                  Prof. C. Rajendra,
Roll no: 10G21D2502                                                Head, Dept. Of CSE,
M.Tech (SE),ASCET,                                                 ASCET,Gudur,
Gudur,Andhra Pradesh, India.                                       Andhra Pradesh, India,
Mail: santhilakshmi14@gmail.com                                    Mail:hod.cse@audisankara.com
Ph: 09493357739.                                                   Ph: 09248748404.



          Abstract: Modern business activities rely on         Leakage detection is handled by watermarking, e.g., a
extensive email exchange. Email leakages have become           unique code is embedded in each distributed copy. If
widespread, and the severe damage caused by such
leakages constitutes a disturbing problem for                  that copy is later discovered in the hands of an
organizations. In this paper we studied the following          unauthorized party, the leaker can be identified. But
problem: In the course of doing business, sometimes the        again it requires code modification. Watermarks can
data distributor will give sensitive data to trusted third
                                                               sometimes be destroyed if the data recipient is
parties. Some of the data is leaked and found in an
unauthorized place. The distributor cannot blame the           malicious. Our goal is to detect when the distributor’s
agent without any evidence. Current approaches can             sensitive data has been leaked by agents, and if
detect the hackers but the total number of evidence will       possible to identify the agent that leaked the data.
be less and the organization may not be able to proceed
legally for further proceedings. In this work, we              Perturbation is a very useful technique where the data
implement and analyze a guilt model that detects the           is modified and made “less sensitive” before being
agents using allocation strategies without modifying the       handed to agents. We develop unobtrusive techniques
original data. Our work identifies the agent who leaked        for detecting leakage of a set of objects or records. In
the data with enough evidence. The main focus of this
paper is to distribute the sensitive data “intelligently” to   this section we develop a model for assessing the
agents in order to improve the chances of detecting a          “guilt” of agents. We also present algorithms for
guilty agent with strong evidence. The objective of our        distributing objects to agents, in a way that improves
work is to improve the probability of identifying
leakages using Data allocation strategies across the
                                                               our chances of identifying a leaker. Finally, we also
agents and also to identify the guilty party who leaked        consider the option of adding “fake” objects to the
the data by injecting “realistic but fake” data records.       distributed set. Such objects do not correspond to real
                                                               entities but appear realistic to the agents. In a sense,
Keywords: Allocation strategies, sensitive data, data
                                                               the fake objects acts as a type of watermark for the
leakage, fake records, third parties.
                                                               entire set, without modifying any individual members.
    1. INTRODUCTION                                            If it turns out an agent was given one or more fake
                                                               objects that were leaked, then the distributor can be
                                                               more confident that agent was guilty
          In the course of doing business, sometimes
sensitive data must be handed over to supposedly               2 PROBLEM SETUP AND NOTATION
trusted third parties. For example, a hospital may give
patient records to Researchers who will devise new
                                                                Entities and Agents
treatments. Similarly, a company may have
partnerships with other companies that require sharing         A distributor owns a set T={t1,....,tm} of valuable data
customer data. Another enterprise may outsource its            objects. The distributor wants to share some of the
data processing, so data must be given to various              objects with a set of agents U1,U2,...Un. but does not
other companies. There always remains a risk of data           wish the objects be leaked to other third parties. The
                                                               objects in T could be of any type and size, e.g., they
getting leaked from the agent. Perturbation is a very
                                                               could be tuples in a relation, or relations in a database.
useful technique where the data are modified and
made “less sensitive” before being handed to agents.
For example, one can add random noise to certain                  An agent Ui receives a subset of objects 𝑅 𝑖 ⊆ 𝑇,
attributes, or one can replace exact values by ranges.         determined either by a sample request or an explicit
But this technique requires modification of data.              request:
                                                                       Sample request 𝑅 𝑖 = 𝑆𝑎𝑚𝑝𝑙𝑒 𝑇, 𝑚 𝑖 . :



                                                                                                                    547
                                           All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
      International Journal of Advanced Research in Computer Engineering & Technology
                                                          Volume 1, Issue 4, June 2012

           Any subset of mi records from T can be            4. DATA ALLOCATION PROBLEM
           given to Ui.
          Explicit                                request   The main focus of this paper is the data allocation
            𝑅 𝑖 = 𝐸𝑋𝑃𝐿𝐼𝐶𝐼𝑇 𝑇, 𝑐𝑜𝑛𝑑 𝑖 .              Agent    problem: how can the distributor “intelligently” give
            𝑈 𝑖 receives all T objects that satisfy 𝑐𝑜𝑛𝑑 𝑖   data to agents in order to improve the chances of
                                                             detecting a guilty agent? As illustrated in Fig. 2, there
                                                             are four instances of this problem we address,
Example. Say that T contains customer records for a          depending on the type of data requests made by agents
  given company A. Company A hires a marketing               and whether “fake objects” are allowed. The two
  agency U1 to do an online survey of customers.             types of requests we handle were defined in Section 2:
  Since any customers will do for the survey, U1             sample and explicit. Fake objects are objects
  requests a sample of 1,000 customer records. At            generated by the distributor that are not in set T . The
  the same time, company A subcontracts with agent           objects are designed to look like real objects, and are
  U2 to handle billing for all California customers.         distributed to agents together with T objects, in order
  Thus, U2 receives all T records that satisfy the           to increase the chances of detecting agents that leak
  condition “state is California.”                           data. We discuss fake objects in more detail in
                                                             Section5.1.
   Although we do not discuss it here, our model can         As shown in Fig. 2, we represent our four problem
be easily extended to requests for a sample of objects       instances with the names 𝐸𝐹 , 𝐸𝐹, 𝑆𝐹 𝑎𝑛𝑑 𝑆𝐹 where E
that satisfy a condition (e.g., an agent wants any 100       stands for explicit requests, S for sample requests, F
California customer records). Also note that we do not       for the use of fake objects, and 𝐹 for the case where
                                                             fake objects are not allowed.
concern ourselves with the randomness of a sample.
                                                             4.1 Fake Objects
(We assume that if a random sample is required, there
                                                                       The distributor may be able to add fake
are enough T records so that the to-be-presented             objects to the distributed data in order to improve his
object selection schemes can pick random records             effectiveness in detecting guilty agents. However,
from T).                                                     fake objects may impact the correctness of what
                                                             agents do, so they may not always be allowable.
                                                               The idea of perturbing data to detect leakage is not
3 RELATED WORK
                                                             new, e.g., [1]. However, in most cases, individual
The guilt detection approach we present is related to        objects are perturbed, e.g., by adding random noise to
the data provenance problem [3]: tracing the lineage         sensitive salaries, or adding a watermark to an image.
of S objects implies essentially the detection of the
                                                             In our case, we are perturbing the set of distributor
guilty agents. Tutorial [4] provides a good overview
on the research conducted in this field. Suggested           objects by adding fake elements
solutions are domain specific, such as lineage tracing
for data ware-houses [5], and assume some prior
knowledge on the way a data view is created out of
data sources. Our problem formulation with objects
and sets is more general and simplifies lineage
tracing, since we do not consider any data
transformation from Ri sets to S.
      As far as the data allocation strategies are
concerned, our work is mostly relevant to
watermarking that is used as a means of establishing
original ownership of distributed objects. Watermarks
were initially used in images [16], video [8], and
audio data [6] whose digital representation includes
considerable redundancy. Recently, [1], [17], [10],
[7], and other works have also studied marks insertion
to relational data. Our approach and watermarking are        4.2 Optimization Problem
similar in the sense of providing agents with some
kind of receiver identifying information. However, by        The distributor’s data allocation to agents has one
its very nature, a watermark modifies the item being         constraint and one objective. The distributor’s
watermarked. If the object to be watermarked cannot          constraint is to satisfy agents’ requests, by providing
be modified, then a watermark cannot be inserted. In         them with the number of objects they request or with
such cases, methods that attach watermarks to the            all available objects that satisfy their conditions. His
distributed data are not applicable.                         objective is to be able to detect an agent who leaks
                                                             any portion of his data.




                                                                                                                 548
                                         All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
      International Journal of Advanced Research in Computer Engineering & Technology
                                                          Volume 1, Issue 4, June 2012

   We consider the constraint as strict. The distributor       baseline. We present s-random in two parts:
may not deny serving an agent request as in [13] and           Algorithm 4 is a general allocation algorithm that is
may not provide agents with different perturbed                used by other algorithms in this section. In line 6 of
versions of the same objects as in [1]. We consider            Algorithm 4, there is a call to function
fake object distribution                                       SELECTOBJECT() whose implementation
as the only possible constraint relaxation.                    differentiates algorithms that rely on
   Our detection objective is ideal and intractable.           Algorithm1 . Algorithm 2 shows function
Detection would be assured only if the distributor             SELECTOBJECT()
gave no data object to any agent (Mungamuru and                for s-random.
Garcia-Molina [11] discuss that to attain “perfect”
privacy and security, we have to sacrifice utility). We        Algorithm 1: Allocation for Sample Data Requests
use instead the following objective: maximize the              (𝑆𝐹 )
chances of detecting a guilty agent that leaks all his         Input: 𝑚1 , . . .,𝑚 𝑛 , 𝑇 .
data objects.                                                             Assuming mi ≤ 𝑇
                                                               Output: R1, . . .,Rn
5. Allocation Strategies:                                      1: a  0 𝑇
In this section, we describe allocation strategies that                   a 𝑘 :number of agents who have
solve exactly or approximately the scalar versions of                         received object tk
(8) for the different instances presented in Fig. 2. We        2: R1  , . . .,Rn  
                                                                                      𝑛
resort to approximate solutions in cases where it is           3: remaining  𝑖=1 𝑚 𝑖
inefficient to solve accurately the optimization               4: while remaining > 0 do
problem.                                                        5: for all i=1, . . . , n : 𝑅𝑖 <mi do
          We deal with problems with explicit data             6: k SELECTOBJECT 𝑖, 𝑅𝑖 .
request, with problems with sample data requests.                             May also use additional parameters
5.1 Explicit Data Requests                                     7: Ri  Ri  𝑡𝑘
           In problems of class EF , the distributor is        8: a 𝑘 a 𝑘  1
not allowed to add fake objects to the distributed data.       9: remaining remaining  1
So, the data allocation is fully defined by the agents’
data requests. Therefore, there is nothing to optimize.        Algorithm 2: Object Selection for s-random
   In EF problems, objective values are initialized by         1: function SELECTOBJECT 𝑖; 𝑅𝑖
agents’ data requests. Say, for example, that 𝑇 =              2: k  select at random an element from
  𝑡1 , 𝑡2 and there are two agents with explicit data           set 𝑘 ′ 𝑡 𝑘 ′ ∉ 𝑅 𝑖
requests such that 𝑅1 = 𝑡1 , 𝑡2 and 𝑅2 = 𝑡1 . The
                                                               3: return k
value of the sum-objective is in this case
           2          2                                               In s-random, we introduce vector a ∈ 𝑁 𝑇 that
                1                        1 1                   shows the object sharing distribution. In particular,
                            𝑅 𝑖 ∩ 𝑅𝑗 =    + = 1.5
                𝑅1                       2 1                   element a 𝑘 shows the number of agents who receive
          𝑖=1        𝑗 =1
                                                               object tk.
                                                                 Algorithm s-random allocates objects to agents in a
5.2 Sample Data Requests                                       round-robin fashion. After the initialization of vectors
 With sample data requests, each agent Ui may                  d and a in lines 1 and 2 of Algorithm 4, the main loop
                               𝑇
receive any T subset out of 𝑚 different ones.                  in lines 4-9 is executed while there are still data
                  𝑛    𝑇                                       objects (remaining > 0) to be allocated to agents. In
Hence, there are 𝑖=1 𝑚 different object allocations.
In every allocation, the distributor can permute T             each iteration of this loop (lines 5-9), the algorithm
objects and keep the same chances of guilty agent              uses function SELECTOBJECT() to find a random
detection. The reason is that the guilt probability            object to allocate to agent Ui. This loop iterates over
depends only on which agents have received the                 all agents who have not received the number of data
leaked objects and not on the identity of the leaked           objects they have requested.
                                                                                                              𝑛
objects.                                                       The running time of the algorithm is 0(𝜏 𝑖=1 𝑚 𝑖 ) and
                                                               depends on the running time 𝜏 of the object selection
Therefore, from the distributor’s perspective, there are       function SELECTOBJECT(). In case of random
different allocations.                                         selection, we can have 𝜏 = 0 1 by keeping in
                                𝑛    𝑇                         memory a set 𝑘 ′ 𝑡 𝑘 ′ ∉ 𝑅 𝑖 for each agent Ui .
                               𝑖=1   𝑚
                                                                                    Algorithm s-random may yield a
                                 𝑇
                                                               poor data allocation.Say, for example, that the
5.2.1 Random                                                   distributor set T has three objects and there are three
An object allocation that satisfies requests and ignores       agents who request one object each. It is possible that
the distributor’s objective is to give each agent Ui a         s-random provides all three agents with the same
randomly selected subset of T of size mi. We denote            object.
this algorithm by s-random and we use it as our




                                                                                                                   549
                                             All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
      International Journal of Advanced Research in Computer Engineering & Technology
                                                          Volume 1, Issue 4, June 2012

6. Experimental Results:                                   [1] R. Agrawal and J. Kiernan, “Watermarking Relational
We implemented the presented allocation algorithms         Databases,” fact improves,      on average,      the min
in Python and we conducted experiments with                values, since the       Proc. 28th Int’l Conf. Very Large
simulated                                                  Data Bases (VLDB      ’02), VLDB Endowment, pp. 155-
data leakage problems to evaluate their performance.       166, 2002.
We present the evaluation for sample requests and
explicit data requests, respectively.                      [2] P. Bonatti, S.D.C. di Vimercati, and P. Samarati, “An
                                                           Algebra for Composing Access Control Policies,” ACM
6.1. Explicit Requests:                                    Trans. Information and System Security, vol. 5, no. 1, pp. 1-
In the first place, the goal of these experiments was to   35, 2002.
see whether fake objects in the distributed data sets
                                                           [3] P. Buneman, S. Khanna, and W.C. Tan, “Why
yield significant improvement in our chances of
                                                           and Where: A Characterization of Data Provenance,”
detecting a guilty agent. In the second place, we
wanted to evaluate our optimal algorithm relative to a     Proc. Eighth Int’l Conf. Database Theory (ICDT ’01), J.V.
random allocation.                                         den Bussche and V. Vianu, eds., pp. 316-330, Jan. 2001

                                                           [4] P. Buneman     and W.-C. Tan, “Provenance    in
6.2 Sample Requests                                        Databases,” Proc. ACM SIGMOD, pp. 1171-1173, 2007.
With sample data requests, agents are not interested in
particular objects. Hence, object sharing is not           [5] Y. Cui and J. Widom, “Lineage Tracing for
explicitly defined by their requests. The distributor is   General  Data Warehouse        Transformations,” The
“forced” to allocate certain objects to multiple agents    VLDB J., vol. 12, pp. 41-58, 2003
                                                  𝑛
only if the number of requested objects 𝑖=1 𝑚 𝑖
exceeds the number of objects in set T . The more          [6]    S. Czerwinski, R. Fromm, and T. Hodes, “Digital
data objects the agents request in total, the more         Music     Distribution   and  Audio    Watermarking,”
recipients, on average, an object has; and the more        http://www.scientificcommons.
objects are shared among different agents, the more        org/43025658, 2007.
difficult it is to detect a guilty agent. Consequently,
the parameter that primarily defines the difficulty of a   [7] F. Guo, J. Wang, Z. Zhang, X. Ye, and D. Li, “An
problem with sample data requests is the ratio.            Improved Algorithm to Watermark Numeric Relational
                          𝑛                                Data,” Information Security Applications, pp. 138-149,
                         𝑖=1   𝑚𝑖                          Springer, 2006.
                           𝑇
                                                           [8] F. Hartung and B. Girod, “Watermarking of
                                                           Uncompressed and Compressed Video,” Signal Processing,
7. Conclusion:                                             vol. 66, no. 3, pp. 283-301, 1998.
          In a perfect world, there would be no need to
hand over sensitive data to agents that may                [9] S. Jajodia, P. Samarati, M.L. Sapino, and V.S.
unknowingly or maliciously leak it. And even if we         Subrahmanian, “Flexible Support for Multiple Access
had to hand over sensitive data, in a perfect world, we    Control Policies,” ACM Trans. Database Systems, vol. 26,
could watermark each object so that we could trace its     no. 2, pp. 214-260, 2001.
origins with absolute certainty. However, in many
cases, we must indeed work with agents that may not        [10] Y. Li, V. Swarup, and S. Jajodia, “Fingerprinting
be 100 percent trusted, and we may not be certain if a     Relational Databases: Schemes and Specialties,” IEEE
leaked object came from an agent or from some other        Trans. Dependable and Secure Computing, vol. 2, no. 1,
source, since certain data cannot admit watermarks.        pp. 34-45, Jan.-Mar. 2005.
          Our future work includes the investigation of
agent guilt models that capture leakage scenarios that     [11] B. Mungamuru and H. Garcia-Molina, “Privacy,
are not studied in this paper. For example, what is the    Preservation and Performance: The 3 P’s of Distributed
appropriate model for cases where agents can collude       Data Management,” technical report, Stanford Univ., 2008.
and identify fake tuples? A preliminary discussion of
such a model is available in [14]. Another open            [12] V.N. Murty, “Counting the Integer Solutions of a
problem is the extension of our allocation strategies so   Linear Equation with Unit Coefficients,” Math. Magazine,
that they can handle agent requests in an online           vol. 54, no. 2, pp. 79-81, 1981
fashion (the presented strategies assume that there is a
fixed set of agents with requests known in advance).       [13] S.U. Nabar, B. Marthi, K. Kenthapadi, N. Mishra, and
                                                           R. Motwani, “Towards Robustness in Query Auditing,”
REFERENCES:                                                Proc. 32nd Int’l Conf. Very Large Data Bases (VLDB
                                                           ’06), VLDB Endowment, pp. 151-162, 2006.




                                                                                                                   550
                                         All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
      International Journal of Advanced Research in Computer Engineering & Technology
                                                          Volume 1, Issue 4, June 2012

[14] P. Papadimitriou and H. Garcia-Molina, “Data
Leakage Detection,” technical report, Stanford Univ., 2008

[15] P.M. Pardalos and S.A. Vavasis, “Quadratic
Programming with One Negative Eigenvalue Is NP-
Hard,” J. Global Optimization

[16] J.J.K.O. Ruanaidh, W.J. Dowling, and F.M. Boland,
“Watermarking Digital Images for Copyright Protection,”
IEE Proc. Vision Signal and Image Processing, vol. 143,
no. 4, pp. 250-256, 1996.

[17] R. Sion, M. Atallah, and S. Prabhakar, “Rights
Protection for Relational Data,” Proc. ACM SIGMOD, pp.
98-109, 2003.

[18] L. Sweeney, “Achieving K-Anonymity Privacy
Protection Using Generalization and Suppression,”
http://en.scientificcommons.org/43196131, 2002




                                                                                  551
                                          All Rights Reserved © 2012 IJARCET

Weitere ähnliche Inhalte

Was ist angesagt?

A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageeSAT Publishing House
 
Data Leakage Detectionusing Distribution Method
Data Leakage Detectionusing Distribution Method Data Leakage Detectionusing Distribution Method
Data Leakage Detectionusing Distribution Method IJMER
 
Fake Product Review Monitoring System
Fake Product Review Monitoring SystemFake Product Review Monitoring System
Fake Product Review Monitoring Systemijtsrd
 
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in OrganizationsA Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in OrganizationsIOSR Journals
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionbunnz12345
 
Text pre-processing of multilingual for sentiment analysis based on social ne...
Text pre-processing of multilingual for sentiment analysis based on social ne...Text pre-processing of multilingual for sentiment analysis based on social ne...
Text pre-processing of multilingual for sentiment analysis based on social ne...IJECEIAES
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionAjitkaur saini
 
Analyse prédictive en assurance santé par Julien Cabot
Analyse prédictive en assurance santé par Julien CabotAnalyse prédictive en assurance santé par Julien Cabot
Analyse prédictive en assurance santé par Julien CabotModern Data Stack France
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques IJECEIAES
 
IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A SurveyIRJET Journal
 
IRJET - Cyberbulling Detection Model
IRJET -  	  Cyberbulling Detection ModelIRJET -  	  Cyberbulling Detection Model
IRJET - Cyberbulling Detection ModelIRJET Journal
 
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)Mark Heid
 
Introducing Enquestor Project V2.0© Web Interphase
Introducing Enquestor Project V2.0© Web InterphaseIntroducing Enquestor Project V2.0© Web Interphase
Introducing Enquestor Project V2.0© Web Interphasepaulvmr
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsIOSR Journals
 
AUTOMATED PHARMACY
AUTOMATED PHARMACYAUTOMATED PHARMACY
AUTOMATED PHARMACYIJSRED
 
Privacy Protectin Models and Defamation caused by k-anonymity
Privacy Protectin Models and Defamation caused by k-anonymityPrivacy Protectin Models and Defamation caused by k-anonymity
Privacy Protectin Models and Defamation caused by k-anonymityHiroshi Nakagawa
 
Scale, Structure, and Semantics
Scale, Structure, and SemanticsScale, Structure, and Semantics
Scale, Structure, and SemanticsDaniel Tunkelang
 

Was ist angesagt? (20)

A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakage
 
Data Leakage Detectionusing Distribution Method
Data Leakage Detectionusing Distribution Method Data Leakage Detectionusing Distribution Method
Data Leakage Detectionusing Distribution Method
 
Fake Product Review Monitoring System
Fake Product Review Monitoring SystemFake Product Review Monitoring System
Fake Product Review Monitoring System
 
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in OrganizationsA Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
 
Ej24856861
Ej24856861Ej24856861
Ej24856861
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Text pre-processing of multilingual for sentiment analysis based on social ne...
Text pre-processing of multilingual for sentiment analysis based on social ne...Text pre-processing of multilingual for sentiment analysis based on social ne...
Text pre-processing of multilingual for sentiment analysis based on social ne...
 
32 99-1-pb
32 99-1-pb32 99-1-pb
32 99-1-pb
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Analyse prédictive en assurance santé par Julien Cabot
Analyse prédictive en assurance santé par Julien CabotAnalyse prédictive en assurance santé par Julien Cabot
Analyse prédictive en assurance santé par Julien Cabot
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
 
IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
 
IRJET - Cyberbulling Detection Model
IRJET -  	  Cyberbulling Detection ModelIRJET -  	  Cyberbulling Detection Model
IRJET - Cyberbulling Detection Model
 
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
 
IBM Stream au Hadoop User Group
IBM Stream au Hadoop User GroupIBM Stream au Hadoop User Group
IBM Stream au Hadoop User Group
 
Introducing Enquestor Project V2.0© Web Interphase
Introducing Enquestor Project V2.0© Web InterphaseIntroducing Enquestor Project V2.0© Web Interphase
Introducing Enquestor Project V2.0© Web Interphase
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
 
AUTOMATED PHARMACY
AUTOMATED PHARMACYAUTOMATED PHARMACY
AUTOMATED PHARMACY
 
Privacy Protectin Models and Defamation caused by k-anonymity
Privacy Protectin Models and Defamation caused by k-anonymityPrivacy Protectin Models and Defamation caused by k-anonymity
Privacy Protectin Models and Defamation caused by k-anonymity
 
Scale, Structure, and Semantics
Scale, Structure, and SemanticsScale, Structure, and Semantics
Scale, Structure, and Semantics
 

Andere mochten auch

Fuzzylogic application aircraft landing
Fuzzylogic application aircraft landingFuzzylogic application aircraft landing
Fuzzylogic application aircraft landingSubin Subair C P
 
Artificial intelligence and Fuzzy Logic
Artificial intelligence and Fuzzy Logic Artificial intelligence and Fuzzy Logic
Artificial intelligence and Fuzzy Logic adeel990
 
Sensors optimized for 3 d digitization
Sensors optimized for 3 d digitizationSensors optimized for 3 d digitization
Sensors optimized for 3 d digitizationBasavaraj Patted
 
Fuzzy Logic ppt
Fuzzy Logic pptFuzzy Logic ppt
Fuzzy Logic pptRitu Bafna
 
Sensors On 3d Digitization
Sensors On 3d DigitizationSensors On 3d Digitization
Sensors On 3d DigitizationRajan Kumar
 
Chapter 5 - Fuzzy Logic
Chapter 5 - Fuzzy LogicChapter 5 - Fuzzy Logic
Chapter 5 - Fuzzy LogicAshique Rasool
 
Sensors on 3 d digitization seminar report
Sensors on 3 d digitization seminar reportSensors on 3 d digitization seminar report
Sensors on 3 d digitization seminar reportVishnu Prasad
 

Andere mochten auch (13)

1.sklqhxma
1.sklqhxma1.sklqhxma
1.sklqhxma
 
98 101
98 10198 101
98 101
 
Fuzzylogic application aircraft landing
Fuzzylogic application aircraft landingFuzzylogic application aircraft landing
Fuzzylogic application aircraft landing
 
Fuzzy logic 2014
Fuzzy logic 2014Fuzzy logic 2014
Fuzzy logic 2014
 
Artificial intelligence and Fuzzy Logic
Artificial intelligence and Fuzzy Logic Artificial intelligence and Fuzzy Logic
Artificial intelligence and Fuzzy Logic
 
Sensors optimized for 3 d digitization
Sensors optimized for 3 d digitizationSensors optimized for 3 d digitization
Sensors optimized for 3 d digitization
 
Fuzzy expert system
Fuzzy expert systemFuzzy expert system
Fuzzy expert system
 
Fuzzy Logic ppt
Fuzzy Logic pptFuzzy Logic ppt
Fuzzy Logic ppt
 
Sensors On 3d Digitization
Sensors On 3d DigitizationSensors On 3d Digitization
Sensors On 3d Digitization
 
Chapter 5 - Fuzzy Logic
Chapter 5 - Fuzzy LogicChapter 5 - Fuzzy Logic
Chapter 5 - Fuzzy Logic
 
Fuzzy logic
Fuzzy logicFuzzy logic
Fuzzy logic
 
Fuzzy logic ppt
Fuzzy logic pptFuzzy logic ppt
Fuzzy logic ppt
 
Sensors on 3 d digitization seminar report
Sensors on 3 d digitization seminar reportSensors on 3 d digitization seminar report
Sensors on 3 d digitization seminar report
 

Ähnlich wie 547 551

Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionrejii
 
Data Leakage Detection
Data Leakage DetectionData Leakage Detection
Data Leakage DetectionAshwini Nerkar
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete SeminarSumit Thakur
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detectionChaitanya Kn
 
IRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET Journal
 
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdfDrog3
 
Privacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage SystemPrivacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage SystemKumar Goud
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET Journal
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionVikrant Arya
 
83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.pptnaresh2004s
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionMohit Pandey
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectiongaurav kumar
 
data-leakage-detection
data-leakage-detectiondata-leakage-detection
data-leakage-detectionNagendra Kumar
 
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdfData leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdfnaresh2004s
 
dataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptxdataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptxnaresh2004s
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionkalpesh1908
 
Data leakage detection
Data leakage detection Data leakage detection
Data leakage detection Suveeksha
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 

Ähnlich wie 547 551 (20)

Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data Leakage Detection
Data Leakage DetectionData Leakage Detection
Data Leakage Detection
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete Seminar
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detection
 
IRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET- Data Leakage Detection System
IRJET- Data Leakage Detection System
 
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
 
Privacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage SystemPrivacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage System
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
 
Sub1555
Sub1555Sub1555
Sub1555
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
data-leakage-detection
data-leakage-detectiondata-leakage-detection
data-leakage-detection
 
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdfData leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
 
dataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptxdataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptx
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
purnima.ppt
purnima.pptpurnima.ppt
purnima.ppt
 
Data leakage detection
Data leakage detection Data leakage detection
Data leakage detection
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 

Mehr von Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Mehr von Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Kürzlich hochgeladen

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Kürzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

547 551

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 EVALUATE FAKE OBJECTS TO PREDICTS UNAUTHENTICATED DEVELOPERS A. Santhi Lakshmi Prof. C. Rajendra, Roll no: 10G21D2502 Head, Dept. Of CSE, M.Tech (SE),ASCET, ASCET,Gudur, Gudur,Andhra Pradesh, India. Andhra Pradesh, India, Mail: santhilakshmi14@gmail.com Mail:hod.cse@audisankara.com Ph: 09493357739. Ph: 09248748404. Abstract: Modern business activities rely on Leakage detection is handled by watermarking, e.g., a extensive email exchange. Email leakages have become unique code is embedded in each distributed copy. If widespread, and the severe damage caused by such leakages constitutes a disturbing problem for that copy is later discovered in the hands of an organizations. In this paper we studied the following unauthorized party, the leaker can be identified. But problem: In the course of doing business, sometimes the again it requires code modification. Watermarks can data distributor will give sensitive data to trusted third sometimes be destroyed if the data recipient is parties. Some of the data is leaked and found in an unauthorized place. The distributor cannot blame the malicious. Our goal is to detect when the distributor’s agent without any evidence. Current approaches can sensitive data has been leaked by agents, and if detect the hackers but the total number of evidence will possible to identify the agent that leaked the data. be less and the organization may not be able to proceed legally for further proceedings. In this work, we Perturbation is a very useful technique where the data implement and analyze a guilt model that detects the is modified and made “less sensitive” before being agents using allocation strategies without modifying the handed to agents. We develop unobtrusive techniques original data. Our work identifies the agent who leaked for detecting leakage of a set of objects or records. In the data with enough evidence. The main focus of this paper is to distribute the sensitive data “intelligently” to this section we develop a model for assessing the agents in order to improve the chances of detecting a “guilt” of agents. We also present algorithms for guilty agent with strong evidence. The objective of our distributing objects to agents, in a way that improves work is to improve the probability of identifying leakages using Data allocation strategies across the our chances of identifying a leaker. Finally, we also agents and also to identify the guilty party who leaked consider the option of adding “fake” objects to the the data by injecting “realistic but fake” data records. distributed set. Such objects do not correspond to real entities but appear realistic to the agents. In a sense, Keywords: Allocation strategies, sensitive data, data the fake objects acts as a type of watermark for the leakage, fake records, third parties. entire set, without modifying any individual members. 1. INTRODUCTION If it turns out an agent was given one or more fake objects that were leaked, then the distributor can be more confident that agent was guilty In the course of doing business, sometimes sensitive data must be handed over to supposedly 2 PROBLEM SETUP AND NOTATION trusted third parties. For example, a hospital may give patient records to Researchers who will devise new Entities and Agents treatments. Similarly, a company may have partnerships with other companies that require sharing A distributor owns a set T={t1,....,tm} of valuable data customer data. Another enterprise may outsource its objects. The distributor wants to share some of the data processing, so data must be given to various objects with a set of agents U1,U2,...Un. but does not other companies. There always remains a risk of data wish the objects be leaked to other third parties. The objects in T could be of any type and size, e.g., they getting leaked from the agent. Perturbation is a very could be tuples in a relation, or relations in a database. useful technique where the data are modified and made “less sensitive” before being handed to agents. For example, one can add random noise to certain An agent Ui receives a subset of objects 𝑅 𝑖 ⊆ 𝑇, attributes, or one can replace exact values by ranges. determined either by a sample request or an explicit But this technique requires modification of data. request:  Sample request 𝑅 𝑖 = 𝑆𝑎𝑚𝑝𝑙𝑒 𝑇, 𝑚 𝑖 . : 547 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Any subset of mi records from T can be 4. DATA ALLOCATION PROBLEM given to Ui.  Explicit request The main focus of this paper is the data allocation 𝑅 𝑖 = 𝐸𝑋𝑃𝐿𝐼𝐶𝐼𝑇 𝑇, 𝑐𝑜𝑛𝑑 𝑖 . Agent problem: how can the distributor “intelligently” give 𝑈 𝑖 receives all T objects that satisfy 𝑐𝑜𝑛𝑑 𝑖 data to agents in order to improve the chances of detecting a guilty agent? As illustrated in Fig. 2, there are four instances of this problem we address, Example. Say that T contains customer records for a depending on the type of data requests made by agents given company A. Company A hires a marketing and whether “fake objects” are allowed. The two agency U1 to do an online survey of customers. types of requests we handle were defined in Section 2: Since any customers will do for the survey, U1 sample and explicit. Fake objects are objects requests a sample of 1,000 customer records. At generated by the distributor that are not in set T . The the same time, company A subcontracts with agent objects are designed to look like real objects, and are U2 to handle billing for all California customers. distributed to agents together with T objects, in order Thus, U2 receives all T records that satisfy the to increase the chances of detecting agents that leak condition “state is California.” data. We discuss fake objects in more detail in Section5.1. Although we do not discuss it here, our model can As shown in Fig. 2, we represent our four problem be easily extended to requests for a sample of objects instances with the names 𝐸𝐹 , 𝐸𝐹, 𝑆𝐹 𝑎𝑛𝑑 𝑆𝐹 where E that satisfy a condition (e.g., an agent wants any 100 stands for explicit requests, S for sample requests, F California customer records). Also note that we do not for the use of fake objects, and 𝐹 for the case where fake objects are not allowed. concern ourselves with the randomness of a sample. 4.1 Fake Objects (We assume that if a random sample is required, there The distributor may be able to add fake are enough T records so that the to-be-presented objects to the distributed data in order to improve his object selection schemes can pick random records effectiveness in detecting guilty agents. However, from T). fake objects may impact the correctness of what agents do, so they may not always be allowable. The idea of perturbing data to detect leakage is not 3 RELATED WORK new, e.g., [1]. However, in most cases, individual The guilt detection approach we present is related to objects are perturbed, e.g., by adding random noise to the data provenance problem [3]: tracing the lineage sensitive salaries, or adding a watermark to an image. of S objects implies essentially the detection of the In our case, we are perturbing the set of distributor guilty agents. Tutorial [4] provides a good overview on the research conducted in this field. Suggested objects by adding fake elements solutions are domain specific, such as lineage tracing for data ware-houses [5], and assume some prior knowledge on the way a data view is created out of data sources. Our problem formulation with objects and sets is more general and simplifies lineage tracing, since we do not consider any data transformation from Ri sets to S. As far as the data allocation strategies are concerned, our work is mostly relevant to watermarking that is used as a means of establishing original ownership of distributed objects. Watermarks were initially used in images [16], video [8], and audio data [6] whose digital representation includes considerable redundancy. Recently, [1], [17], [10], [7], and other works have also studied marks insertion to relational data. Our approach and watermarking are 4.2 Optimization Problem similar in the sense of providing agents with some kind of receiver identifying information. However, by The distributor’s data allocation to agents has one its very nature, a watermark modifies the item being constraint and one objective. The distributor’s watermarked. If the object to be watermarked cannot constraint is to satisfy agents’ requests, by providing be modified, then a watermark cannot be inserted. In them with the number of objects they request or with such cases, methods that attach watermarks to the all available objects that satisfy their conditions. His distributed data are not applicable. objective is to be able to detect an agent who leaks any portion of his data. 548 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 We consider the constraint as strict. The distributor baseline. We present s-random in two parts: may not deny serving an agent request as in [13] and Algorithm 4 is a general allocation algorithm that is may not provide agents with different perturbed used by other algorithms in this section. In line 6 of versions of the same objects as in [1]. We consider Algorithm 4, there is a call to function fake object distribution SELECTOBJECT() whose implementation as the only possible constraint relaxation. differentiates algorithms that rely on Our detection objective is ideal and intractable. Algorithm1 . Algorithm 2 shows function Detection would be assured only if the distributor SELECTOBJECT() gave no data object to any agent (Mungamuru and for s-random. Garcia-Molina [11] discuss that to attain “perfect” privacy and security, we have to sacrifice utility). We Algorithm 1: Allocation for Sample Data Requests use instead the following objective: maximize the (𝑆𝐹 ) chances of detecting a guilty agent that leaks all his Input: 𝑚1 , . . .,𝑚 𝑛 , 𝑇 . data objects.  Assuming mi ≤ 𝑇 Output: R1, . . .,Rn 5. Allocation Strategies: 1: a  0 𝑇 In this section, we describe allocation strategies that  a 𝑘 :number of agents who have solve exactly or approximately the scalar versions of received object tk (8) for the different instances presented in Fig. 2. We 2: R1  , . . .,Rn   𝑛 resort to approximate solutions in cases where it is 3: remaining  𝑖=1 𝑚 𝑖 inefficient to solve accurately the optimization 4: while remaining > 0 do problem. 5: for all i=1, . . . , n : 𝑅𝑖 <mi do We deal with problems with explicit data 6: k SELECTOBJECT 𝑖, 𝑅𝑖 . request, with problems with sample data requests.  May also use additional parameters 5.1 Explicit Data Requests 7: Ri  Ri  𝑡𝑘 In problems of class EF , the distributor is 8: a 𝑘 a 𝑘  1 not allowed to add fake objects to the distributed data. 9: remaining remaining  1 So, the data allocation is fully defined by the agents’ data requests. Therefore, there is nothing to optimize. Algorithm 2: Object Selection for s-random In EF problems, objective values are initialized by 1: function SELECTOBJECT 𝑖; 𝑅𝑖 agents’ data requests. Say, for example, that 𝑇 = 2: k  select at random an element from 𝑡1 , 𝑡2 and there are two agents with explicit data set 𝑘 ′ 𝑡 𝑘 ′ ∉ 𝑅 𝑖 requests such that 𝑅1 = 𝑡1 , 𝑡2 and 𝑅2 = 𝑡1 . The 3: return k value of the sum-objective is in this case 2 2 In s-random, we introduce vector a ∈ 𝑁 𝑇 that 1 1 1 shows the object sharing distribution. In particular, 𝑅 𝑖 ∩ 𝑅𝑗 = + = 1.5 𝑅1 2 1 element a 𝑘 shows the number of agents who receive 𝑖=1 𝑗 =1 object tk. Algorithm s-random allocates objects to agents in a 5.2 Sample Data Requests round-robin fashion. After the initialization of vectors With sample data requests, each agent Ui may d and a in lines 1 and 2 of Algorithm 4, the main loop 𝑇 receive any T subset out of 𝑚 different ones. in lines 4-9 is executed while there are still data 𝑛 𝑇 objects (remaining > 0) to be allocated to agents. In Hence, there are 𝑖=1 𝑚 different object allocations. In every allocation, the distributor can permute T each iteration of this loop (lines 5-9), the algorithm objects and keep the same chances of guilty agent uses function SELECTOBJECT() to find a random detection. The reason is that the guilt probability object to allocate to agent Ui. This loop iterates over depends only on which agents have received the all agents who have not received the number of data leaked objects and not on the identity of the leaked objects they have requested. 𝑛 objects. The running time of the algorithm is 0(𝜏 𝑖=1 𝑚 𝑖 ) and depends on the running time 𝜏 of the object selection Therefore, from the distributor’s perspective, there are function SELECTOBJECT(). In case of random different allocations. selection, we can have 𝜏 = 0 1 by keeping in 𝑛 𝑇 memory a set 𝑘 ′ 𝑡 𝑘 ′ ∉ 𝑅 𝑖 for each agent Ui . 𝑖=1 𝑚 Algorithm s-random may yield a 𝑇 poor data allocation.Say, for example, that the 5.2.1 Random distributor set T has three objects and there are three An object allocation that satisfies requests and ignores agents who request one object each. It is possible that the distributor’s objective is to give each agent Ui a s-random provides all three agents with the same randomly selected subset of T of size mi. We denote object. this algorithm by s-random and we use it as our 549 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 6. Experimental Results: [1] R. Agrawal and J. Kiernan, “Watermarking Relational We implemented the presented allocation algorithms Databases,” fact improves, on average, the min in Python and we conducted experiments with values, since the Proc. 28th Int’l Conf. Very Large simulated Data Bases (VLDB ’02), VLDB Endowment, pp. 155- data leakage problems to evaluate their performance. 166, 2002. We present the evaluation for sample requests and explicit data requests, respectively. [2] P. Bonatti, S.D.C. di Vimercati, and P. Samarati, “An Algebra for Composing Access Control Policies,” ACM 6.1. Explicit Requests: Trans. Information and System Security, vol. 5, no. 1, pp. 1- In the first place, the goal of these experiments was to 35, 2002. see whether fake objects in the distributed data sets [3] P. Buneman, S. Khanna, and W.C. Tan, “Why yield significant improvement in our chances of and Where: A Characterization of Data Provenance,” detecting a guilty agent. In the second place, we wanted to evaluate our optimal algorithm relative to a Proc. Eighth Int’l Conf. Database Theory (ICDT ’01), J.V. random allocation. den Bussche and V. Vianu, eds., pp. 316-330, Jan. 2001 [4] P. Buneman and W.-C. Tan, “Provenance in 6.2 Sample Requests Databases,” Proc. ACM SIGMOD, pp. 1171-1173, 2007. With sample data requests, agents are not interested in particular objects. Hence, object sharing is not [5] Y. Cui and J. Widom, “Lineage Tracing for explicitly defined by their requests. The distributor is General Data Warehouse Transformations,” The “forced” to allocate certain objects to multiple agents VLDB J., vol. 12, pp. 41-58, 2003 𝑛 only if the number of requested objects 𝑖=1 𝑚 𝑖 exceeds the number of objects in set T . The more [6] S. Czerwinski, R. Fromm, and T. Hodes, “Digital data objects the agents request in total, the more Music Distribution and Audio Watermarking,” recipients, on average, an object has; and the more http://www.scientificcommons. objects are shared among different agents, the more org/43025658, 2007. difficult it is to detect a guilty agent. Consequently, the parameter that primarily defines the difficulty of a [7] F. Guo, J. Wang, Z. Zhang, X. Ye, and D. Li, “An problem with sample data requests is the ratio. Improved Algorithm to Watermark Numeric Relational 𝑛 Data,” Information Security Applications, pp. 138-149, 𝑖=1 𝑚𝑖 Springer, 2006. 𝑇 [8] F. Hartung and B. Girod, “Watermarking of Uncompressed and Compressed Video,” Signal Processing, 7. Conclusion: vol. 66, no. 3, pp. 283-301, 1998. In a perfect world, there would be no need to hand over sensitive data to agents that may [9] S. Jajodia, P. Samarati, M.L. Sapino, and V.S. unknowingly or maliciously leak it. And even if we Subrahmanian, “Flexible Support for Multiple Access had to hand over sensitive data, in a perfect world, we Control Policies,” ACM Trans. Database Systems, vol. 26, could watermark each object so that we could trace its no. 2, pp. 214-260, 2001. origins with absolute certainty. However, in many cases, we must indeed work with agents that may not [10] Y. Li, V. Swarup, and S. Jajodia, “Fingerprinting be 100 percent trusted, and we may not be certain if a Relational Databases: Schemes and Specialties,” IEEE leaked object came from an agent or from some other Trans. Dependable and Secure Computing, vol. 2, no. 1, source, since certain data cannot admit watermarks. pp. 34-45, Jan.-Mar. 2005. Our future work includes the investigation of agent guilt models that capture leakage scenarios that [11] B. Mungamuru and H. Garcia-Molina, “Privacy, are not studied in this paper. For example, what is the Preservation and Performance: The 3 P’s of Distributed appropriate model for cases where agents can collude Data Management,” technical report, Stanford Univ., 2008. and identify fake tuples? A preliminary discussion of such a model is available in [14]. Another open [12] V.N. Murty, “Counting the Integer Solutions of a problem is the extension of our allocation strategies so Linear Equation with Unit Coefficients,” Math. Magazine, that they can handle agent requests in an online vol. 54, no. 2, pp. 79-81, 1981 fashion (the presented strategies assume that there is a fixed set of agents with requests known in advance). [13] S.U. Nabar, B. Marthi, K. Kenthapadi, N. Mishra, and R. Motwani, “Towards Robustness in Query Auditing,” REFERENCES: Proc. 32nd Int’l Conf. Very Large Data Bases (VLDB ’06), VLDB Endowment, pp. 151-162, 2006. 550 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 [14] P. Papadimitriou and H. Garcia-Molina, “Data Leakage Detection,” technical report, Stanford Univ., 2008 [15] P.M. Pardalos and S.A. Vavasis, “Quadratic Programming with One Negative Eigenvalue Is NP- Hard,” J. Global Optimization [16] J.J.K.O. Ruanaidh, W.J. Dowling, and F.M. Boland, “Watermarking Digital Images for Copyright Protection,” IEE Proc. Vision Signal and Image Processing, vol. 143, no. 4, pp. 250-256, 1996. [17] R. Sion, M. Atallah, and S. Prabhakar, “Rights Protection for Relational Data,” Proc. ACM SIGMOD, pp. 98-109, 2003. [18] L. Sweeney, “Achieving K-Anonymity Privacy Protection Using Generalization and Suppression,” http://en.scientificcommons.org/43196131, 2002 551 All Rights Reserved © 2012 IJARCET