SlideShare ist ein Scribd-Unternehmen logo
1 von 54
BY: MOHAMMED ATHEEQ SHARIEFF
HARSHA VAIDYANATH
AMITH B.K
UNDER GUIDANCE OF: Mr.RAJESH
A project on
Privacy-Preserving Detection
of Sensitive Data Exposure
1
Abstract
The exposure of sensitive data in storage and
transmission poses a serious threat to organizational
and personal security.
Data leak detection aims at scanning content for
exposed sensitive data.
2
 In this project the system propose a data- leake
detection (DLD).
It can be outsourced and be deployed in a semi-honest
detection environment.
This approach works well especially in the case where
consecutive data blocks are leaked
3
INTRODUCTION
Current applications tend to use personal sensitive
information to achieve better quality with respect to their
services. Since the third parties are not trusted the data must
be protected such that individual data privacy is not
compromised but at the same time operations on it would be
compatible. 4
 The system implement, and evaluate a new privacy-
preserving data-leak detection system that enables the
data owner to safely deploy locally, or to delegate the
traffic-inspection task to DLD providers without
exposing the sensitive data.
5
 In our model, the data owner computes a special
set of digests or fingerprints from the sensitive data,
and then discloses only a small amount of digest
information to the DLD provider.
6
Existing system
In existing system, the system used MD5 algorithms.
The MD5 message-digest algorithm is a widely used
cryptographic hash function producing a 128-bit (16-byte) hash
value, typically expressed in text format as a 32 digit
hexadecimal number.
 MD5 has been utilized in a wide variety of cryptographic
applications, and is also commonly used to verify data integrity. 7
Disadvantages
The customer or data owner does not need to fully
trust the DLD provider using our approach.
Keywords usually do not cover enough sensitive data
segments for data-leak detection.
It does not aim to provide an remote service.
8
Proposed system
The system propose a privacy-preserving data-leak
detection model for preventing inadvertent data leak
in network traffic.
The DLD provider may learn sensitive information
from the traffic, which is inevitable for all deep
packet inspection approaches. 9
 The proposed system uses (Secure Hash algorithm
(SHA) to generate short and hard-to-reverse digests
through the fast polynomial modulus operation.
10
Advantages
This strong privacy guarantee yields a powerful
application of fuzzy fingerprint method in the cloud
computing environment.
It provides high accuracy performance
It has very low false positive rate.
The privacy guarantee of this approach is much higher 11
FLOW
DIAGRAM
12
SYSTEM ARCHITECTURE
13
USE CASE DIAGRAM
14
CLASS DIAGRAM
15
SEQUENCE DIAGRAM
16
MODULES
 Data Owner
 Fuzzy finger Print
 DLD
 Data Receiver
17
MODULES DESCRIPTION
18
Data Owner
The system enables the data owner to securely
delegate the content-inspection task to DLD providers
without exposing the sensitive data.
The data owner computes a special set of digests or
fingerprints from the sensitive data and then discloses
only a small amount of them to the DLD provider. 19
 It is the data owner, who post-processes the potential
leaks sent back by the DLD provider and determines
whether there is any real data leak.
The sensitive data is sent by a legitimate user intended
for legitimate purposes. The data owner is aware of
legitimate data transfers and permits such transfers.
20
 So the data owner can tell whether a piece of
sensitive data in the network traffic is a leak using
legitimate data transfer policies.
21
Data Owner
22
Fuzzy finger Print
To achieve the privacy goal, the data owner
generates a special type of digests.
The digests are called fuzzy fingerprints.
23
IMPLENEMTATION
1.Data Encryption
Standard (DES)
DES algorithm is used to encrypt
and decrypt data in our project
24
• DES works by encrypting groups of 64 message bits,
• Out of which 56 are key bits and remaining 8 are
check bits.
25
• 2.Secure Hash Algorithm
• Message digest is 160 bits, 20 bytes, 40 digit
hexadecimal format notation .
• It has 80 rounds.
• It produces a short and hard to reverse hash
key
26
• Algorithm structure :
• Step 1: Padding bits
• Step 2: Appending length as 64 bit unsigned
• Step 3: Buffer initiation
• Step 4: Processing of message
• Step 5: Output
• example, the SHA-256 hash code for “www.mytecbits.com ” is
• 575f62a15889fa8ca55514a10754d2f98e30c57c4538f0f3e39dc531
14533857.
27
 It prevents the DLD provider from learning its exact
value.
The data owner transforms each fingerprints into a
fuzzy fingerprint.
All fuzzy fingerprints are collected and form the
output of this operation.
28
Fuzzy finger Print
29
DLD
The DLD provider computes fingerprints from
network traffic and identifies potential leaks in
them.
To prevent the DLD provider from gathering
exact knowledge about the sensitive data,
30
the collection of potential leaks is composed of
real leaks and noises.
 It is the data owner, who post-processes the
potential leaks sent back by the DLD provider and
determines whether there is any real data leak.
31
DLD
The DLD server detects the sensitive data within
each packet on basis of a stateless filtering
system.
DLD provider inspects the network traffic for
potential data leaks.
32
 The inspection can be performed offline without
causing any real-time delay in routing the packets.
However, the DLD provider may attempt to gain
knowledge about the sensitive data.
33
DLD
34
Data receiver
This operation is run by the data receiver on
each piece of sensitive data.
The data reciever recieves the data and this
data is in encrypted format.
The data is decrypted and text is obtained.
35
Data receiver
36
System Requirements
37
System Requirements
Software Requirements:
• O/S : Windows XP / 7 / 8 / 10
• Language : Java.
• IDE : Eclipse
• Data Base : MySQL
38
System Requirements
Hardware Requirements
• System : Pentium IV 2.4 GHz and above
• Hard Disk : 160 GB
• Monitor : 15 VGA color
• Mouse : Logitech.
• Keyboard : 110 keys enhanced
• Ram : 2GB 39
LITERATURE SURVEY
40
Title Year Author Methodology Advantages Disadvantag
es
Data leak
detection as a
service
2012 Xiaokui
Shu
Danfeng
(Daphne)
Yao
The system propose a
network-based data-
leak detection (DLD)
technique, the main
feature of which is that
the detection
does not require the
data owner to reveal
the content of the
sensitive data. Instead,
only a small amount of
specialized digests are
needed
provide a
quantifiable
method to
measure the
privacy
guarantee
offered by
our
fuzzy
fingerprint
framework.
It is not
efficient
enough for
practical data
leak
inspection in
this setting.
41
Title Year Author Methodology Advantages Disadvantag
es
Quantifying
Information
Leaks in
Outbound
Web Traffic
2009 Kevin
Borders
Atul
Prakash
The system present an
approach for
quantifying
information leak
capacity in network
traffic. Instead of
trying to detect the
presence of sensitive
data—an impossible
task in the
general case—our goal
is to measure and
constrain its
maximum volume
it possible to
identify
smaller
leaks.
Traffic
measurement
does not
completely
stop
information
leaks from
slipping by
undetected
42
Title Year Author Methodology Advantages Disadvantag
es
Panorama:
Capturing
system-wide
information
flow for
malware
detection and
analysis
2007 H. Yin, D.
Song, M.
Egele, C.
Kruegel,
and E.
Kirda,
We propose a system,
Panorama, to
detect and analyze
malware by capturing
this fundamental
trait. In our extensive
experiments,
Panorama successfully
detected all the
malware samples and
had very few false
positives.
It does send
back
sensitive
information
to remote
servers in
certain
settings
detecting
malware and
analyzing
unknown
code samples
are
insufficient
and have
significant
shortcomings
.
43
Title Year Author Methodology Advantages Disadvantag
es
Protecting
confidential
data on
personal
computers
with storage
capsules
2009 K.
Borders,
E. V.
Weele, B.
Lau, and A
. Prakash
This paper introduces
Storages Capsules, a
new approach for
protecting confidential
files on a personal
computer. Storage
Capsules are
encrypted file
containers that allow a
compromised machine
to securely view and
edit sensitive files
without malware being
able to steal
confidential data
The system
achieves this
goal by
taking a
checkpoint of
the current
system state
and disabling
device output
before
allowing
access a
Storage
Capsule
It do not rely
on high
integrity.
44
Title Year Author Methodology Advantages Disadvantag
es
Preventing
accidental
data
disclosure in
modern
operating
systems
2013 A.
Nadkarni
and W.
Enck,
This paper presents
Aquifer as a policy
framework and system
for preventing
accidental information
disclosure in modern
operating systems. In
Aquifer, application
developers define
secrecy restrictions
that protect the entire
user interface
workflow defining the
user task
the lack of
application
separation
did not
expose it as a
concern.
It may not be
trusted with
that data.
45
Title Year Author Methodology Advantages Disadvantag
es
Revolver: An
automated
approach to
the detection
of evasive
web-based
malware,
2013 A.
Kapravelo
s, Y.
Shoshitais
hvili, M.
Cova, C.
Kruegel,
and G.
Vigna
In this paper, we
present Revolver, a
novel approach to
automatically detect
evasive behavior in
malicious JavaScript.
Revolver uses efficient
techniques to identify
similarities between a
large number of
JavaScript programs
(despite their use of
obfuscation
techniques, such as
packing,polymorphism
Revolver
has identified
several
techniques
that attackers
use to evade
existing
detection
tools by
continuously
running in
parallel with
a honeyclient.
This
approach was
defeated by
static
detection of
the malicious
code using
signatures.
46
Title Year Author Methodology Advantages Disadvantag
es
Gyrus: A
framework
for
user-intent
monitoring of
text-based
networked
applications,
2014 Y. Jang, S.
P. Chung,
B. D.
Payne, and
W. Lee
In this paper, we
propose a way to
break this cycle by
ensuring that a
system’s behavior
matches the user’s
intent. Since our
approach is attack
agnostic, it will scale
better than traditional
security systems
Gyrus is very
efficient and
introduces
no noticeable
delay to a
users’
interaction
with the
protected
applications
Gyrus solves
problem by
relying on the
semantics,
but not the
timing of user
generated
events
47
Title Year Author Methodology Advantages Disadvantag
es
Privacy-
preserving
scanning
of big content
for sensitive
data exposure
with
MapReduce
2015 F. Liu, X.
Shu, D.
Yao, and
A. R. Butt,
Our solution uses the
MapReduce-
framework for
detecting exposed
sensitive content,
because it has the
ability to arbitrarily
scale and utilize public
resources for the task,
such as Amazon EC2.
We design new
MapReduce
algorithms for
computing collection
intersection for data
This
transformatio
n supports
the secure
out-
sourcing of
the data leak
detection to
untrusted
MapReduce
and cloud
providers.
a significant
portion
of the
incidents are
caused by
unintentional
mistakes of
employees or
data owners
48
Title Year Author Methodology Advantages Disadvantag
es
Fuzzy
keyword
search over
encrypted
data in cloud
computing
2010 J. Li, Q.
Wang, C.
Wang, N.
Cao, K.
Ren, and
W. Lou,
In this paper, for
the first time we
formalize and solve
the problem of
effective fuzzy
keyword search over
encrypted cloud data
while maintaining
keyword privacy.
proposed
solution is
secure and
privacy-
preserving,
while
correctly
realizing the
goal of fuzzy
keyword
search.
unsuitable in
Cloud
Computing as
it greatly
affects
system
usability,
rendering
user
searching
experiences
very
frustrating
and system
efficacy very
Title Year Author Methodology Advantages Disadvantag
es
Towards
practical
avoidance of
information
leakage in
enterprise
networks
2011 J. Croft
and M.
Caesar,
In this paper, we
propose a network-
wide method
of confining and
controlling the flow of
sensitive data
within a network. Our
approach is based on
black-box differencing
– we run two logical
copies of the network,
one with private data
scrubbed, and compare
outputs of the two to
determine if and when
purpose
schemes that
leverage
black-box
differencing
to mitigate
leakage of
private data.
It may not be
able to
monitor
encrypted
traffic
without
encryption
keys or
information
flows that are
intentionally
obfuscated by
attackers.
50
Conclusion
Preventing sensitive data from being compromised is an
important and practical research problem.
The proposed system used (Secure Hash algorithm (SHA) to
generate short and hard-to-reverse digests through the fast
polynomial modulus operation.
51
Using special digests, the exposure of the sensitive
data is kept to a minimum during the detection.
52
References
[1] X. Shu and D. Yao, “Data leak detection as a service,”
in Proc. 8th Int. Conf. Secur. Privacy Commun. Netw.,
2012, pp. 222–240.
[2] K. Borders and A. Prakash, “Quantifying information
leaks in outbound web traffic,” in Proc. 30th IEEE Symp.
Secur. Privacy , May 2009, pp. 129–140. 53
References
[3] H. Yin, D. Song, M. Egele, C. Kruegel, and E.
Kirda, “Panorama: Capturing system-wide
information flow for malware detection and analysis,”
in Proc. 14th ACM Conf. Comput. Commun. Secur. ,
2007, pp. 116–127.
54

Weitere ähnliche Inhalte

Was ist angesagt?

Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionVikrant Arya
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete SeminarSumit Thakur
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionrejii
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET Journal
 
IRJET- A Literature Review on Deta Leakage Detection
IRJET-  	  A Literature Review on Deta Leakage DetectionIRJET-  	  A Literature Review on Deta Leakage Detection
IRJET- A Literature Review on Deta Leakage DetectionIRJET Journal
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposureredpel dot com
 
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in OrganizationsA Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in OrganizationsIOSR Journals
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemZTech Proje
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityHappiest Minds Technologies
 
Privacy Preserving Data Leak Detection for Sensitive Data
Privacy Preserving Data Leak Detection for Sensitive DataPrivacy Preserving Data Leak Detection for Sensitive Data
Privacy Preserving Data Leak Detection for Sensitive Datapaperpublications3
 
Hacking databases
Hacking databasesHacking databases
Hacking databasessunil kumar
 
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.Ravtach Solutions
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkillijtsrd
 
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...IJERA Editor
 
Telecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes ClassificationTelecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes ClassificationMaruthi Nataraj K
 
Forensic intelligence
Forensic intelligenceForensic intelligence
Forensic intelligencedentpress
 

Was ist angesagt? (20)

Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete Seminar
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
 
IRJET- A Literature Review on Deta Leakage Detection
IRJET-  	  A Literature Review on Deta Leakage DetectionIRJET-  	  A Literature Review on Deta Leakage Detection
IRJET- A Literature Review on Deta Leakage Detection
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in OrganizationsA Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering system
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
 
Privacy Preserving Data Leak Detection for Sensitive Data
Privacy Preserving Data Leak Detection for Sensitive DataPrivacy Preserving Data Leak Detection for Sensitive Data
Privacy Preserving Data Leak Detection for Sensitive Data
 
Wcc elise features
Wcc elise featuresWcc elise features
Wcc elise features
 
Sqrrl
SqrrlSqrrl
Sqrrl
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
 
C3602021025
C3602021025C3602021025
C3602021025
 
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
Integrating DLP and the 4 W's is a Must by Uzi Yair - CEO, GTB Technologies Inc.
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkill
 
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
 
Telecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes ClassificationTelecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes Classification
 
Forensic intelligence
Forensic intelligenceForensic intelligence
Forensic intelligence
 

Ähnlich wie P2 Project

FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSUREFUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSUREIJCI JOURNAL
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePvrtechnologies Nellore
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageShakas Technologies
 
JPD1407 Identity-Based Distributed Provable Data Possession in Multi- Cloud ...
JPD1407  Identity-Based Distributed Provable Data Possession in Multi- Cloud ...JPD1407  Identity-Based Distributed Provable Data Possession in Multi- Cloud ...
JPD1407 Identity-Based Distributed Provable Data Possession in Multi- Cloud ...chennaijp
 
identity-based distributed provable data possession in multi-cloud storage
identity-based distributed provable data possession in multi-cloud storageidentity-based distributed provable data possession in multi-cloud storage
identity-based distributed provable data possession in multi-cloud storageswathi78
 
Sample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for loginSample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for loginnaveendurga557
 
Secure Distibuted data discovery & dissemination IN WSN
Secure Distibuted data discovery & dissemination IN WSNSecure Distibuted data discovery & dissemination IN WSN
Secure Distibuted data discovery & dissemination IN WSNSWAMI06
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storagePapitha Velumani
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptxTranVu383073
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmIRJET Journal
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageIRJET Journal
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud ComputingIRJET Journal
 
Privacy and integrity-preserving range queries in sensor networks
Privacy  and integrity-preserving range queries in sensor networksPrivacy  and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networksIMPULSE_TECHNOLOGY
 

Ähnlich wie P2 Project (20)

FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSUREFUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
 
JPD1407 Identity-Based Distributed Provable Data Possession in Multi- Cloud ...
JPD1407  Identity-Based Distributed Provable Data Possession in Multi- Cloud ...JPD1407  Identity-Based Distributed Provable Data Possession in Multi- Cloud ...
JPD1407 Identity-Based Distributed Provable Data Possession in Multi- Cloud ...
 
identity-based distributed provable data possession in multi-cloud storage
identity-based distributed provable data possession in multi-cloud storageidentity-based distributed provable data possession in multi-cloud storage
identity-based distributed provable data possession in multi-cloud storage
 
project 11
project 11project 11
project 11
 
Sample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for loginSample PPT Format.pptx E-commerce website for login
Sample PPT Format.pptx E-commerce website for login
 
Secure Distibuted data discovery & dissemination IN WSN
Secure Distibuted data discovery & dissemination IN WSNSecure Distibuted data discovery & dissemination IN WSN
Secure Distibuted data discovery & dissemination IN WSN
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Phase1
Phase1Phase1
Phase1
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
FOGCOMPUTING
FOGCOMPUTINGFOGCOMPUTING
FOGCOMPUTING
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
Privacy and integrity-preserving range queries in sensor networks
Privacy  and integrity-preserving range queries in sensor networksPrivacy  and integrity-preserving range queries in sensor networks
Privacy and integrity-preserving range queries in sensor networks
 

P2 Project

  • 1. BY: MOHAMMED ATHEEQ SHARIEFF HARSHA VAIDYANATH AMITH B.K UNDER GUIDANCE OF: Mr.RAJESH A project on Privacy-Preserving Detection of Sensitive Data Exposure 1
  • 2. Abstract The exposure of sensitive data in storage and transmission poses a serious threat to organizational and personal security. Data leak detection aims at scanning content for exposed sensitive data. 2
  • 3.  In this project the system propose a data- leake detection (DLD). It can be outsourced and be deployed in a semi-honest detection environment. This approach works well especially in the case where consecutive data blocks are leaked 3
  • 4. INTRODUCTION Current applications tend to use personal sensitive information to achieve better quality with respect to their services. Since the third parties are not trusted the data must be protected such that individual data privacy is not compromised but at the same time operations on it would be compatible. 4
  • 5.  The system implement, and evaluate a new privacy- preserving data-leak detection system that enables the data owner to safely deploy locally, or to delegate the traffic-inspection task to DLD providers without exposing the sensitive data. 5
  • 6.  In our model, the data owner computes a special set of digests or fingerprints from the sensitive data, and then discloses only a small amount of digest information to the DLD provider. 6
  • 7. Existing system In existing system, the system used MD5 algorithms. The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number.  MD5 has been utilized in a wide variety of cryptographic applications, and is also commonly used to verify data integrity. 7
  • 8. Disadvantages The customer or data owner does not need to fully trust the DLD provider using our approach. Keywords usually do not cover enough sensitive data segments for data-leak detection. It does not aim to provide an remote service. 8
  • 9. Proposed system The system propose a privacy-preserving data-leak detection model for preventing inadvertent data leak in network traffic. The DLD provider may learn sensitive information from the traffic, which is inevitable for all deep packet inspection approaches. 9
  • 10.  The proposed system uses (Secure Hash algorithm (SHA) to generate short and hard-to-reverse digests through the fast polynomial modulus operation. 10
  • 11. Advantages This strong privacy guarantee yields a powerful application of fuzzy fingerprint method in the cloud computing environment. It provides high accuracy performance It has very low false positive rate. The privacy guarantee of this approach is much higher 11
  • 17. MODULES  Data Owner  Fuzzy finger Print  DLD  Data Receiver 17
  • 19. Data Owner The system enables the data owner to securely delegate the content-inspection task to DLD providers without exposing the sensitive data. The data owner computes a special set of digests or fingerprints from the sensitive data and then discloses only a small amount of them to the DLD provider. 19
  • 20.  It is the data owner, who post-processes the potential leaks sent back by the DLD provider and determines whether there is any real data leak. The sensitive data is sent by a legitimate user intended for legitimate purposes. The data owner is aware of legitimate data transfers and permits such transfers. 20
  • 21.  So the data owner can tell whether a piece of sensitive data in the network traffic is a leak using legitimate data transfer policies. 21
  • 23. Fuzzy finger Print To achieve the privacy goal, the data owner generates a special type of digests. The digests are called fuzzy fingerprints. 23
  • 24. IMPLENEMTATION 1.Data Encryption Standard (DES) DES algorithm is used to encrypt and decrypt data in our project 24
  • 25. • DES works by encrypting groups of 64 message bits, • Out of which 56 are key bits and remaining 8 are check bits. 25
  • 26. • 2.Secure Hash Algorithm • Message digest is 160 bits, 20 bytes, 40 digit hexadecimal format notation . • It has 80 rounds. • It produces a short and hard to reverse hash key 26
  • 27. • Algorithm structure : • Step 1: Padding bits • Step 2: Appending length as 64 bit unsigned • Step 3: Buffer initiation • Step 4: Processing of message • Step 5: Output • example, the SHA-256 hash code for “www.mytecbits.com ” is • 575f62a15889fa8ca55514a10754d2f98e30c57c4538f0f3e39dc531 14533857. 27
  • 28.  It prevents the DLD provider from learning its exact value. The data owner transforms each fingerprints into a fuzzy fingerprint. All fuzzy fingerprints are collected and form the output of this operation. 28
  • 30. DLD The DLD provider computes fingerprints from network traffic and identifies potential leaks in them. To prevent the DLD provider from gathering exact knowledge about the sensitive data, 30
  • 31. the collection of potential leaks is composed of real leaks and noises.  It is the data owner, who post-processes the potential leaks sent back by the DLD provider and determines whether there is any real data leak. 31
  • 32. DLD The DLD server detects the sensitive data within each packet on basis of a stateless filtering system. DLD provider inspects the network traffic for potential data leaks. 32
  • 33.  The inspection can be performed offline without causing any real-time delay in routing the packets. However, the DLD provider may attempt to gain knowledge about the sensitive data. 33
  • 35. Data receiver This operation is run by the data receiver on each piece of sensitive data. The data reciever recieves the data and this data is in encrypted format. The data is decrypted and text is obtained. 35
  • 38. System Requirements Software Requirements: • O/S : Windows XP / 7 / 8 / 10 • Language : Java. • IDE : Eclipse • Data Base : MySQL 38
  • 39. System Requirements Hardware Requirements • System : Pentium IV 2.4 GHz and above • Hard Disk : 160 GB • Monitor : 15 VGA color • Mouse : Logitech. • Keyboard : 110 keys enhanced • Ram : 2GB 39
  • 41. Title Year Author Methodology Advantages Disadvantag es Data leak detection as a service 2012 Xiaokui Shu Danfeng (Daphne) Yao The system propose a network-based data- leak detection (DLD) technique, the main feature of which is that the detection does not require the data owner to reveal the content of the sensitive data. Instead, only a small amount of specialized digests are needed provide a quantifiable method to measure the privacy guarantee offered by our fuzzy fingerprint framework. It is not efficient enough for practical data leak inspection in this setting. 41
  • 42. Title Year Author Methodology Advantages Disadvantag es Quantifying Information Leaks in Outbound Web Traffic 2009 Kevin Borders Atul Prakash The system present an approach for quantifying information leak capacity in network traffic. Instead of trying to detect the presence of sensitive data—an impossible task in the general case—our goal is to measure and constrain its maximum volume it possible to identify smaller leaks. Traffic measurement does not completely stop information leaks from slipping by undetected 42
  • 43. Title Year Author Methodology Advantages Disadvantag es Panorama: Capturing system-wide information flow for malware detection and analysis 2007 H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, We propose a system, Panorama, to detect and analyze malware by capturing this fundamental trait. In our extensive experiments, Panorama successfully detected all the malware samples and had very few false positives. It does send back sensitive information to remote servers in certain settings detecting malware and analyzing unknown code samples are insufficient and have significant shortcomings . 43
  • 44. Title Year Author Methodology Advantages Disadvantag es Protecting confidential data on personal computers with storage capsules 2009 K. Borders, E. V. Weele, B. Lau, and A . Prakash This paper introduces Storages Capsules, a new approach for protecting confidential files on a personal computer. Storage Capsules are encrypted file containers that allow a compromised machine to securely view and edit sensitive files without malware being able to steal confidential data The system achieves this goal by taking a checkpoint of the current system state and disabling device output before allowing access a Storage Capsule It do not rely on high integrity. 44
  • 45. Title Year Author Methodology Advantages Disadvantag es Preventing accidental data disclosure in modern operating systems 2013 A. Nadkarni and W. Enck, This paper presents Aquifer as a policy framework and system for preventing accidental information disclosure in modern operating systems. In Aquifer, application developers define secrecy restrictions that protect the entire user interface workflow defining the user task the lack of application separation did not expose it as a concern. It may not be trusted with that data. 45
  • 46. Title Year Author Methodology Advantages Disadvantag es Revolver: An automated approach to the detection of evasive web-based malware, 2013 A. Kapravelo s, Y. Shoshitais hvili, M. Cova, C. Kruegel, and G. Vigna In this paper, we present Revolver, a novel approach to automatically detect evasive behavior in malicious JavaScript. Revolver uses efficient techniques to identify similarities between a large number of JavaScript programs (despite their use of obfuscation techniques, such as packing,polymorphism Revolver has identified several techniques that attackers use to evade existing detection tools by continuously running in parallel with a honeyclient. This approach was defeated by static detection of the malicious code using signatures. 46
  • 47. Title Year Author Methodology Advantages Disadvantag es Gyrus: A framework for user-intent monitoring of text-based networked applications, 2014 Y. Jang, S. P. Chung, B. D. Payne, and W. Lee In this paper, we propose a way to break this cycle by ensuring that a system’s behavior matches the user’s intent. Since our approach is attack agnostic, it will scale better than traditional security systems Gyrus is very efficient and introduces no noticeable delay to a users’ interaction with the protected applications Gyrus solves problem by relying on the semantics, but not the timing of user generated events 47
  • 48. Title Year Author Methodology Advantages Disadvantag es Privacy- preserving scanning of big content for sensitive data exposure with MapReduce 2015 F. Liu, X. Shu, D. Yao, and A. R. Butt, Our solution uses the MapReduce- framework for detecting exposed sensitive content, because it has the ability to arbitrarily scale and utilize public resources for the task, such as Amazon EC2. We design new MapReduce algorithms for computing collection intersection for data This transformatio n supports the secure out- sourcing of the data leak detection to untrusted MapReduce and cloud providers. a significant portion of the incidents are caused by unintentional mistakes of employees or data owners 48
  • 49. Title Year Author Methodology Advantages Disadvantag es Fuzzy keyword search over encrypted data in cloud computing 2010 J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, In this paper, for the first time we formalize and solve the problem of effective fuzzy keyword search over encrypted cloud data while maintaining keyword privacy. proposed solution is secure and privacy- preserving, while correctly realizing the goal of fuzzy keyword search. unsuitable in Cloud Computing as it greatly affects system usability, rendering user searching experiences very frustrating and system efficacy very
  • 50. Title Year Author Methodology Advantages Disadvantag es Towards practical avoidance of information leakage in enterprise networks 2011 J. Croft and M. Caesar, In this paper, we propose a network- wide method of confining and controlling the flow of sensitive data within a network. Our approach is based on black-box differencing – we run two logical copies of the network, one with private data scrubbed, and compare outputs of the two to determine if and when purpose schemes that leverage black-box differencing to mitigate leakage of private data. It may not be able to monitor encrypted traffic without encryption keys or information flows that are intentionally obfuscated by attackers. 50
  • 51. Conclusion Preventing sensitive data from being compromised is an important and practical research problem. The proposed system used (Secure Hash algorithm (SHA) to generate short and hard-to-reverse digests through the fast polynomial modulus operation. 51
  • 52. Using special digests, the exposure of the sensitive data is kept to a minimum during the detection. 52
  • 53. References [1] X. Shu and D. Yao, “Data leak detection as a service,” in Proc. 8th Int. Conf. Secur. Privacy Commun. Netw., 2012, pp. 222–240. [2] K. Borders and A. Prakash, “Quantifying information leaks in outbound web traffic,” in Proc. 30th IEEE Symp. Secur. Privacy , May 2009, pp. 129–140. 53
  • 54. References [3] H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, “Panorama: Capturing system-wide information flow for malware detection and analysis,” in Proc. 14th ACM Conf. Comput. Commun. Secur. , 2007, pp. 116–127. 54