SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
ISSN: 2278 – 1323
           International Journal of Advanced Research in Computer Engineering & Technology
                                                               Volume 1, Issue 4, June 2012




           A Model for identifying Guilty Agents in
                   Data Transmission


                           Shreyta Raj , Dr. Ravinder Purwar , Ashutosh Dangwal



Abstract-- This research paper presents a formal                 company may have partnerships with other
method for representing and detecting inconsistencies of         companies that require sharing customer data.
combined secrecy models is to detect when the PC                 Another enterprise may outsource its data processing,
distributor’s sensitive data has been leaked by their
                                                                 so data must be given to various other companies.
agents, and if possible to identify the agent that leaked
                                                                 We call the owner of the data the distributor and the
the data. Data leakage is a silent type of threat. This
sensitive information can be electronically distributed          supposedly trusted third parties the agents. Our goal
via e-mail, Web sites, FTP, instant messaging,                   is to detect when the distributor’s sensitive data has
spreadsheets, databases, and any other electronic means          been leaked by agents, and if possible to identify the
available – all without your knowledge. Data allocation          agent that leaked the data. We consider applications
strategies (across the agents) are proposed that improve         where the original sensitive data cannot be perturbed.
the probability of identifying leakages. These methods           Perturbation is a very useful technique where the data
do not rely on alterations of the released data (e.g.,           is modified and made “less sensitive” before being
watermarks). In some cases the distributor can also
                                                                 handed to agents. For example, one can add random
inject “realistic but fake” data records to further
                                                                 noise to certain attributes, or one can replace exact
improve our chances of detecting leakage and
identifying the guilty party. A model for assessing the          values by ranges. However, in some cases it is
“guilt” of agents using C# dot net technologies with MS          important not to alter the original distributor’s data.
sql server as backend is proposed to develop.                    For example, if an outsourcer is doing our payroll, he
Algorithms for distributing objects to agents, in a way          must have the exact salary and customer bank
that improves our chances of identifying a leaker is             account numbers. If medical researchers will be
aloes presented. Finally, the option of adding “fake”            treating patients (as opposed to simply computing
objects to the distributed set is also considered. Such          statistics), they may need accurate data for the
objects do not correspond to real entities but appear.
                                                                 patients.
Index Terms - Data Leakage, Data Privacy, Fake                   Traditionally, leakage detection is handled by
Record,.
                                                                 watermarking, e.g., a unique code is embedded in
                I. INTRODUCTION                                  each distributed copy. If that copy is later discovered
                                                                 in the hands of an unauthorized party, the leaker can
While doing business, practical necessities may                  be identified. Watermarks can be very useful in some
motivate the use of secrecy models in combination                cases, but again, involve some modification of the
and in addition other business policies may be                   original data. Furthermore, watermarks can
necessary sometimes sensitive data must be handed                sometimes be destroyed if the data recipient is
over to supposedly trusted third parties. For example,           malicious.
a hospital may give patient records to researchers
who will devise new treatments. Similarly, a

                                                                                                                   709

                                            All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
           International Journal of Advanced Research in Computer Engineering & Technology
                                                               Volume 1, Issue 4, June 2012


In this work, unobtrusive techniques for detecting               opposed to simply computing statistics), they may
leakage of a set of objects or records have been                 need accurate data for the patients.
studied. For example, after giving a set of objects to
agents, the distributor discovers some of those same
objects in an unauthorized place. At this point the              B. Watermarking
distributor can assess the likelihood that the leaked            Traditionally, leakage detection is handled by
data came from one or more agents, as opposed to                 watermarking, e.g., a unique code is embedded in
having been independently gathered by other means.               each distributed copy. If that copy is later discovered
Using an analogy with cookies stolen from a cookie               in the hands of an unauthorized party, the leaker can
jar, if we catch Freddie with a single cookie, he can            be identified. Watermarks can be very useful in some
argue that a friend gave him the cookie. But if we               cases, but again, involve some modification of the
catch Freddie with 5 cookies, it will be much harder             original data. Furthermore, watermarks can
for him to argue that his hands were not in the cookie           sometimes be destroyed if the data recipient is
jar. If the distributor sees “enough evidence” that an           malicious.
agent leaked data, he may stop doing business with
him, or may initiate legal proceedings. In this paper
we develop a model for assessing the “guilt” of                                  III. PROPOSED SYSTEM
agents. We also present algorithms for distributing
objects to agents, in a way that improves our chances            Unobtrusive techniques for detecting leakage of a set of
of identifying a leaker. Finally, we also consider the           objects or records have been studied. After giving a set of
option of adding “fake” objects to the distributed set.          objects to agents, the distributor discovers some of those
Such objects do not correspond to real entities but              same objects in an unauthorized place. (For example, the
appear realistic to the agents. In a sense, the fake             data may be found on a web site, or may be obtained
                                                                 through a legal discovery process.) At this point the
objects acts as a type of watermark for the entire set,
                                                                 distributor can assess the likelihood that the leaked data
without modifying any individual members. If it
                                                                 came from one or more agents, as opposed to having been
turns out an agent was given one or more fake objects            independently gathered by other means. Using an analogy
that were leaked, then the distributor can be more               with cookies stolen from a cookie jar, if Freddie with a
confident that agent was guilty.                                 single cookie has been cached, he can argue that a friend
                                                                 gave him the cookie. But if Freddie with 5 cookies has been
                                                                 cached, it will be much harder for him to argue that his
              II. EXISTING SYSTEM                                hands were not in the cookie jar. If the distributor sees
                                                                 “enough evidence” that an agent leaked data, he may stop
A. Perturbation                                                  doing business with him, or may initiate legal proceedings.
Data perturbation refers to a data transformation
process typically performed by the data owners                   A model for assessing the “guilt” of agents has been
before publishing their data. The goal of performing             developed. An algorithm for distributing objects to agents,
such data transformation is two-fold. On one hand,               in a way that improves our chances of identifying a leaker
                                                                 has been proposed. The option of adding “fake” objects to
the data owners want to change the data in a certain
                                                                 the distributed set also been considered. Such objects do
way in order to disguise the sensitive information               not correspond to real entities but appear realistic to the
contained in the published datasets, and on the other            agents. In a sense, the fake objects acts as a type of
hand, the data owners want the transformation to best            watermark for the entire set, without modifying any
preserve. For example, one can add random noise to               individual members. If it turns out an agent was given one
certain attributes, or one can replace exact values by           or more fake objects that were leaked, then the distributor
ranges. However, in some cases it is important not to            can be more confident that agent was guilty.
alter the original distributor’s data. For example, if an
outsourcer is doing our payroll, he must have the
exact salary and customer bank account numbers. If               Advantages-
medical researchers will be treating patients (as

                                                                                                                       710

                                            All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
           International Journal of Advanced Research in Computer Engineering & Technology
                                                               Volume 1, Issue 4, June 2012


         After giving a set of objects to agents, the              number of guilt agents by the number of file transfers
          distributor discovers some of those same                  between the agent and unauthorized person.
          objects in an unauthorized place.
                                                                    A. MODULE DESCRIPTION
         At this point the distributor can assess the
                                                                         1- Login / Registrations - This is a module
          likelihood that the leaked data came from
                                                                            mainly designed to provide the authority to a
          one or more agents, as opposed to having
                                                                            user in order to access the other modules of
          been independently gathered by other
                                                                            the project.
          means.
                                                                         2- Data Transfer- This module is mainly
                                                                            designed to transfer data from distributor to
         If the distributor sees “enough evidence”
                                                                            agents. The same module can also be used
          that an agent leaked data, he may stop doing
                                                                            for illegal data transfer from authorized to
          business with him, or may initiate legal
                                                                            agents to other agents
          proceedings.
                                                                         3- Guilt Model Analysis- This module is
                                                                            designed using the agent – guilt model.
         To develop a model for assessing the “guilt”
                                                                            Here a count value(also called as fake
          of agents.
                                                                            objects) are incremented for any transfer of
                                                                            data occurrence when agent transfers data.
         We also present algorithms for distributing
                                                                            Fake objects are stored in database.
          objects to agents, in a way that improves our
                                                                         4- Agent Guilt Model- This module is mainly
          chances     of     identifying    a   leaker.
                                                                            designed for determining fake agents. This
                                                                            module uses fake objects (which is stored in
         Consider the option of adding “fake” objects
                                                                            database from guilt model module) and
          to the distributed set. Such objects do not
                                                                            determines the guilt agent along with the
          correspond to real entities but appear.
                                                                            probability. A graph is used to plot the
                                                                            probability distribution of data which is
         If it turns out an agent was given one or
                                                                            leaked by fake agents.
          more fake objects that were leaked, then the
          distributor can be more confident that agent              To compute this probability, we need an estimate for
          was guilty.                                               the probability that values can be “guessed” by the
                                                                    target.

                                                                    B. Algorithm Steps

                                                                    Step: 1 Distributor select agent to send data
            IV. IMPLEMENTATION PLAN
                                                                            The distributor selects two agents and gives
In this application, we try to implement a model application        requested data R1, R2 to both agents.
to detect the data leakages between distributor and agents.
The system is developed in C# dot net. We use Microsoft             Step: 2 Distributor creates fake object and allocates it
SQL Server 2000 as database for this application. When the          to the agent
distributor sends a file to agent, it is considered as fake
object for that particular agent, in this sequence file name        The distributor can create one fake object (B = 1) and
and file path is stored in the database for future reference.       both agents can receive one fake object (b1 = b2 = 1).
                                                                    If the distributor is able to create more fake objects,
Similarly when the agent sends a file to                 the
                                                                    he could further improve the objective.
unauthorized agent the sequence is store in              the
database. Thus we can find the guilt agent.             The         Step: 3 check number of agents, who have already
probability function is calculated based on              the        received data
                                                                                                                       711

                                               All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
          International Journal of Advanced Research in Computer Engineering & Technology
                                                              Volume 1, Issue 4, June 2012


       Distributor checks the number of agents, who                            VI. LITERATURE REVIEW
have already received data.
                                                               The guilt detection approach we present is related to
Step: 4 Check for remaining agents                             the data provenance problem, tracing the lineage of S
                                                               objects implies essentially the detection of the guilty
Distributor chooses the remaining agents to send the           agents.
data. Distributor can increase the number of possible
allocations by adding fake object.
                                                                        Suggested solutions are domain specific,
Step: 5 Select fake object again to allocate for                         such as lineage tracing for data warehouses
remaining agents                                                         and assume some prior knowledge on the
                                                                         way a data view is created out of data
Distributor chooses the random fake object to
                                                                         sources.
allocate for the remaining agents.

Step: 6 Estimate the probability value for guilt agent
                                                                        Watermarks were initially used in images,
To compute this probability, we need an estimate for
                                                                         video and audio data whose digital
the probability that values can be “guessed” by the
                                                                         representation      includes     considerable
target.
                                                                         redundancy. Watermarking is similar in the
                                                                         sense of providing agents with some kind of
                                                                         receiver-identifying information. However,
            V. WHY USE DATAMINING                                        by its very nature, a watermark modifies the
                                                                         item being watermarked. If the object to be
Data mining is the process of extracting patterns from                   watermarked cannot be modified then a
data. Data mining is becoming an increasingly                            watermark cannot be inserted. In such cases
important tool to transform the data into information.                   methods that attach watermarks to the
It is commonly used in a wide range of profiling                         distributed data are not applicable.
practices such as marketing, surveillance fraud
detection and scientific discovery. Data mining can
be used to uncover patterns in data but is often                        Recently, works have also studied marks
carried out only on samples of data. The mining                          insertion to relational data.
process will be ineffective if the samples are not a
good representation of the larger body of data. Data
mining cannot discover patterns that may be present                     There are also lots of other works on
in the larger body of data if those patterns are not                     mechanisms that allow only authorized users
present in the sample being "mined". Inability to find                   to access sensitive data through access
patterns may become a cause for some disputes                            control policies. Such approaches prevent in
between customers and service providers. Therefore                       some sense data leakage by sharing
data mining is not foolproof but may be useful if                        information only with trusted parties.
sufficiently representative data samples are collected.                  However, these policies are restrictive and
The discovery of a particular pattern in a particular                    may make it impossible to satisfy agents’
set of data does not necessarily mean that a pattern is                  requests.
found elsewhere in the larger data from which that
sample was drawn. An important part of the process
is the verification and validation of patterns on other
samples of data




                                                                                                                 712

                                          All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
            International Journal of Advanced Research in Computer Engineering & Technology
                                                                Volume 1, Issue 4, June 2012


          Algorithm Results to find out Guilty Agents                                      REFERENCES

                                                                   [1] R. Agrawal and J. Kiernan. Watermarking relational databases.
                                                                   In VLDB ’02: Proceedings of the 28th international conference on
                                                                   Very Large Data Bases, pages 155–166. VLDB Endowment, 2002.

                                                                   [2] P. Bonatti, S. D. C. di Vimercati, and P. Samarati. An algebra
                                                                   for composing access control policies. ACM Trans. Inf. Syst.
                                                                   Secur., 5(1):1–35, 2002.

                                                                   [3] P. Buneman, S. Khanna, and W. C. Tan. Why and where: A
                                                                   characterization of data provenance. In J. V. den Bussche and V.
                                                                   Vianu, editors, Database Theory - ICDT 2001, 8th International
                                                                   Conference, London, UK, January 4-6, 2001, Proceedings, volume
                                                                   1973
                                                                   of Lecture Notes in Computer Science, pages 316–330. Springer,
Note: a002 is the guilty agent.                                    2001.

                                                                   [4] P. Buneman and W.-C. Tan. Provenance in databases. In
                                                                   SIGMOD ’07: Proceedings of the 2007 ACM SIGMOD
                                                                   international conference on Management of data, pages 1171–
          Probability distribution of Agent Data
                                                                   1173, New York, NY, USA, 2007. ACM.

                                                                   [5] Y. Cui and J. Widom. Lineage tracing for general data
                                                                   warehouse transformations. In The VLDB Journal, pages 471–480,
                                                                   2001.

                                                                   [6] V. N. Murty. Counting the integer solutions of a linear equation
                                                                   with unit coefficients. Mathematics Magazine, 54(2):79–81, 1981.

                                                                   [7] P. Papadimitriou and H. Garcia-Molina. Data leakage
                                                                   detection.Technical report, Stanford University,  2008.


                                                                   [8] J. J. K. O. Ruanaidh, W. J. Dowling, and F. M. Boland.
                                                                   Watermarking digital images for copyright protection. I.E.E.
                                                                   Proceedings on Vision, Signal and Image Processing, 143(4):250–
                                                                   256,                                                      1996.

                                                                   [9] R. Sion, M. Atallah, and S. Prabhakar. Rights protection for
                                                                   relational data. In SIGMOD ’03: Proceedings of the 2003 ACM
                                                                   SIGMOD international conference on Management of data, pages
                                                                   98–109, New York, NY, USA, 2003. ACM.

                                                                   [10] L. Sweeney. Achieving k-anonymity privacy protection
                                                                   usinggeneralization and suppression, 2002.
7. CONCLUSION
The likelihood that an agent is responsible for a leak is          [11] S. U. Nabar, B. Marthi, K. Kenthapadi, N. Mishra, and R.
assessed, based on the overlap of his data with the leaked         Motwani. Towards robustness in query auditing. In VLDB ’06:
                                                                   Proceedings of the 32nd international conference on Very large
data and the data of other agents, and based on the
                                                                   data bases, pages 151–162. VLDB Endowment, 2006.
probability that objects can be “guessed” by other means.
The algorithms we have presented implement a variety of            [12] P. M. Pardalos and S. A. Vavasis. Quadratic programming
data distribution strategies that can improve the                  with one negative eigenvalue is np-hard. Journal of Global
distributor’s chances of identifying a leaker. We have             Optimization,                1(1):15–22,                1991.
shown that distributing objects judiciously can make a
significant difference in identifying guilty agents,
especially in cases where there is large overlap in the data
that agents must receive.
                                                                                                                                 713

                                              All Rights Reserved © 2012 IJARCET

Weitere ähnliche Inhalte

Was ist angesagt?

Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionIOSR Journals
 
Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And DiscoveryRonald Coleman
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Miningwanani181
 
ANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATIONANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATIONpharmaindexing
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?CallPM
 
What is data_science
What is data_scienceWhat is data_science
What is data_scienceidris2
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudIOSR Journals
 
Case study nuix edrm enron data set
Case study nuix edrm enron data setCase study nuix edrm enron data set
Case study nuix edrm enron data setNuix
 
The Investigative Lab - Nuix
The Investigative Lab - NuixThe Investigative Lab - Nuix
The Investigative Lab - NuixNuix
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsIOSR Journals
 
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330With-All-Due-Diligence20150330
With-All-Due-Diligence20150330Jim Kramer
 
Information Management and Analytics
Information Management and Analytics Information Management and Analytics
Information Management and Analytics AKAGroup
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital AgeSherpa Software
 
NogaLogic-DataClassification&Governace&BusinessIntelligence
NogaLogic-DataClassification&Governace&BusinessIntelligenceNogaLogic-DataClassification&Governace&BusinessIntelligence
NogaLogic-DataClassification&Governace&BusinessIntelligenceGiuliano Bonassi
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationiWriteEssays
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data miningharithavijay94
 
How to protect the cookies once someone gets into the cookie jar
How to protect the cookies once someone gets into the cookie jarHow to protect the cookies once someone gets into the cookie jar
How to protect the cookies once someone gets into the cookie jarJudgeEagle
 

Was ist angesagt? (19)

Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
 
Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And Discovery
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Mining
 
ANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATIONANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATION
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
What is data_science
What is data_scienceWhat is data_science
What is data_science
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
 
Case study nuix edrm enron data set
Case study nuix edrm enron data setCase study nuix edrm enron data set
Case study nuix edrm enron data set
 
The Investigative Lab - Nuix
The Investigative Lab - NuixThe Investigative Lab - Nuix
The Investigative Lab - Nuix
 
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logsAchieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
 
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330With-All-Due-Diligence20150330
With-All-Due-Diligence20150330
 
Information Management and Analytics
Information Management and Analytics Information Management and Analytics
Information Management and Analytics
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital Age
 
NogaLogic-DataClassification&Governace&BusinessIntelligence
NogaLogic-DataClassification&Governace&BusinessIntelligenceNogaLogic-DataClassification&Governace&BusinessIntelligence
NogaLogic-DataClassification&Governace&BusinessIntelligence
 
Big Data: 8 facts and 8 fictions
Big Data: 8 facts and 8 fictionsBig Data: 8 facts and 8 fictions
Big Data: 8 facts and 8 fictions
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentation
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data mining
 
Ediscovery 101
Ediscovery 101Ediscovery 101
Ediscovery 101
 
How to protect the cookies once someone gets into the cookie jar
How to protect the cookies once someone gets into the cookie jarHow to protect the cookies once someone gets into the cookie jar
How to protect the cookies once someone gets into the cookie jar
 

Andere mochten auch (9)

690 698
690 698690 698
690 698
 
129 134
129 134129 134
129 134
 
347 352
347 352347 352
347 352
 
79 81
79 8179 81
79 81
 
119 128
119 128119 128
119 128
 
Pdf5
Pdf5Pdf5
Pdf5
 
87 90
87 9087 90
87 90
 
11 15
11 1511 15
11 15
 
Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 

Ähnlich wie 709 713

Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionrejii
 
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdfDrog3
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detectionChaitanya Kn
 
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionData Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionIOSR Journals
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete SeminarSumit Thakur
 
Dn31538540
Dn31538540Dn31538540
Dn31538540IJMER
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionbunnz12345
 
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in OrganizationsA Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in OrganizationsIOSR Journals
 
Data Leakage Detection
Data Leakage DetectionData Leakage Detection
Data Leakage DetectionAshwini Nerkar
 
Privacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage SystemPrivacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage SystemKumar Goud
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionkalpesh1908
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionAjitkaur saini
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectiongaurav kumar
 
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdfData leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdfnaresh2004s
 
dataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptxdataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptxnaresh2004s
 
IRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET Journal
 
83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.pptnaresh2004s
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageeSAT Publishing House
 

Ähnlich wie 709 713 (20)

Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detection
 
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionData Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage Detection
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete Seminar
 
Dn31538540
Dn31538540Dn31538540
Dn31538540
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in OrganizationsA Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
 
Data Leakage Detection
Data Leakage DetectionData Leakage Detection
Data Leakage Detection
 
Privacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage SystemPrivacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage System
 
DLD_SYNOPSIS
DLD_SYNOPSISDLD_SYNOPSIS
DLD_SYNOPSIS
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdfData leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
 
dataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptxdataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptx
 
IRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET- Data Leakage Detection System
IRJET- Data Leakage Detection System
 
83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakage
 

Mehr von Editor IJARCET

Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Editor IJARCET
 

Mehr von Editor IJARCET (20)

Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
 

Kürzlich hochgeladen

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Kürzlich hochgeladen (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

709 713

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 A Model for identifying Guilty Agents in Data Transmission Shreyta Raj , Dr. Ravinder Purwar , Ashutosh Dangwal Abstract-- This research paper presents a formal company may have partnerships with other method for representing and detecting inconsistencies of companies that require sharing customer data. combined secrecy models is to detect when the PC Another enterprise may outsource its data processing, distributor’s sensitive data has been leaked by their so data must be given to various other companies. agents, and if possible to identify the agent that leaked We call the owner of the data the distributor and the the data. Data leakage is a silent type of threat. This sensitive information can be electronically distributed supposedly trusted third parties the agents. Our goal via e-mail, Web sites, FTP, instant messaging, is to detect when the distributor’s sensitive data has spreadsheets, databases, and any other electronic means been leaked by agents, and if possible to identify the available – all without your knowledge. Data allocation agent that leaked the data. We consider applications strategies (across the agents) are proposed that improve where the original sensitive data cannot be perturbed. the probability of identifying leakages. These methods Perturbation is a very useful technique where the data do not rely on alterations of the released data (e.g., is modified and made “less sensitive” before being watermarks). In some cases the distributor can also handed to agents. For example, one can add random inject “realistic but fake” data records to further noise to certain attributes, or one can replace exact improve our chances of detecting leakage and identifying the guilty party. A model for assessing the values by ranges. However, in some cases it is “guilt” of agents using C# dot net technologies with MS important not to alter the original distributor’s data. sql server as backend is proposed to develop. For example, if an outsourcer is doing our payroll, he Algorithms for distributing objects to agents, in a way must have the exact salary and customer bank that improves our chances of identifying a leaker is account numbers. If medical researchers will be aloes presented. Finally, the option of adding “fake” treating patients (as opposed to simply computing objects to the distributed set is also considered. Such statistics), they may need accurate data for the objects do not correspond to real entities but appear. patients. Index Terms - Data Leakage, Data Privacy, Fake Traditionally, leakage detection is handled by Record,. watermarking, e.g., a unique code is embedded in I. INTRODUCTION each distributed copy. If that copy is later discovered in the hands of an unauthorized party, the leaker can While doing business, practical necessities may be identified. Watermarks can be very useful in some motivate the use of secrecy models in combination cases, but again, involve some modification of the and in addition other business policies may be original data. Furthermore, watermarks can necessary sometimes sensitive data must be handed sometimes be destroyed if the data recipient is over to supposedly trusted third parties. For example, malicious. a hospital may give patient records to researchers who will devise new treatments. Similarly, a 709 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 In this work, unobtrusive techniques for detecting opposed to simply computing statistics), they may leakage of a set of objects or records have been need accurate data for the patients. studied. For example, after giving a set of objects to agents, the distributor discovers some of those same objects in an unauthorized place. At this point the B. Watermarking distributor can assess the likelihood that the leaked Traditionally, leakage detection is handled by data came from one or more agents, as opposed to watermarking, e.g., a unique code is embedded in having been independently gathered by other means. each distributed copy. If that copy is later discovered Using an analogy with cookies stolen from a cookie in the hands of an unauthorized party, the leaker can jar, if we catch Freddie with a single cookie, he can be identified. Watermarks can be very useful in some argue that a friend gave him the cookie. But if we cases, but again, involve some modification of the catch Freddie with 5 cookies, it will be much harder original data. Furthermore, watermarks can for him to argue that his hands were not in the cookie sometimes be destroyed if the data recipient is jar. If the distributor sees “enough evidence” that an malicious. agent leaked data, he may stop doing business with him, or may initiate legal proceedings. In this paper we develop a model for assessing the “guilt” of III. PROPOSED SYSTEM agents. We also present algorithms for distributing objects to agents, in a way that improves our chances Unobtrusive techniques for detecting leakage of a set of of identifying a leaker. Finally, we also consider the objects or records have been studied. After giving a set of option of adding “fake” objects to the distributed set. objects to agents, the distributor discovers some of those Such objects do not correspond to real entities but same objects in an unauthorized place. (For example, the appear realistic to the agents. In a sense, the fake data may be found on a web site, or may be obtained through a legal discovery process.) At this point the objects acts as a type of watermark for the entire set, distributor can assess the likelihood that the leaked data without modifying any individual members. If it came from one or more agents, as opposed to having been turns out an agent was given one or more fake objects independently gathered by other means. Using an analogy that were leaked, then the distributor can be more with cookies stolen from a cookie jar, if Freddie with a confident that agent was guilty. single cookie has been cached, he can argue that a friend gave him the cookie. But if Freddie with 5 cookies has been cached, it will be much harder for him to argue that his II. EXISTING SYSTEM hands were not in the cookie jar. If the distributor sees “enough evidence” that an agent leaked data, he may stop A. Perturbation doing business with him, or may initiate legal proceedings. Data perturbation refers to a data transformation process typically performed by the data owners A model for assessing the “guilt” of agents has been before publishing their data. The goal of performing developed. An algorithm for distributing objects to agents, such data transformation is two-fold. On one hand, in a way that improves our chances of identifying a leaker has been proposed. The option of adding “fake” objects to the data owners want to change the data in a certain the distributed set also been considered. Such objects do way in order to disguise the sensitive information not correspond to real entities but appear realistic to the contained in the published datasets, and on the other agents. In a sense, the fake objects acts as a type of hand, the data owners want the transformation to best watermark for the entire set, without modifying any preserve. For example, one can add random noise to individual members. If it turns out an agent was given one certain attributes, or one can replace exact values by or more fake objects that were leaked, then the distributor ranges. However, in some cases it is important not to can be more confident that agent was guilty. alter the original distributor’s data. For example, if an outsourcer is doing our payroll, he must have the exact salary and customer bank account numbers. If Advantages- medical researchers will be treating patients (as 710 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012  After giving a set of objects to agents, the number of guilt agents by the number of file transfers distributor discovers some of those same between the agent and unauthorized person. objects in an unauthorized place. A. MODULE DESCRIPTION  At this point the distributor can assess the 1- Login / Registrations - This is a module likelihood that the leaked data came from mainly designed to provide the authority to a one or more agents, as opposed to having user in order to access the other modules of been independently gathered by other the project. means. 2- Data Transfer- This module is mainly designed to transfer data from distributor to  If the distributor sees “enough evidence” agents. The same module can also be used that an agent leaked data, he may stop doing for illegal data transfer from authorized to business with him, or may initiate legal agents to other agents proceedings. 3- Guilt Model Analysis- This module is designed using the agent – guilt model.  To develop a model for assessing the “guilt” Here a count value(also called as fake of agents. objects) are incremented for any transfer of data occurrence when agent transfers data.  We also present algorithms for distributing Fake objects are stored in database. objects to agents, in a way that improves our 4- Agent Guilt Model- This module is mainly chances of identifying a leaker. designed for determining fake agents. This module uses fake objects (which is stored in  Consider the option of adding “fake” objects database from guilt model module) and to the distributed set. Such objects do not determines the guilt agent along with the correspond to real entities but appear. probability. A graph is used to plot the probability distribution of data which is  If it turns out an agent was given one or leaked by fake agents. more fake objects that were leaked, then the distributor can be more confident that agent To compute this probability, we need an estimate for was guilty. the probability that values can be “guessed” by the target. B. Algorithm Steps Step: 1 Distributor select agent to send data IV. IMPLEMENTATION PLAN The distributor selects two agents and gives In this application, we try to implement a model application requested data R1, R2 to both agents. to detect the data leakages between distributor and agents. The system is developed in C# dot net. We use Microsoft Step: 2 Distributor creates fake object and allocates it SQL Server 2000 as database for this application. When the to the agent distributor sends a file to agent, it is considered as fake object for that particular agent, in this sequence file name The distributor can create one fake object (B = 1) and and file path is stored in the database for future reference. both agents can receive one fake object (b1 = b2 = 1). If the distributor is able to create more fake objects, Similarly when the agent sends a file to the he could further improve the objective. unauthorized agent the sequence is store in the database. Thus we can find the guilt agent. The Step: 3 check number of agents, who have already probability function is calculated based on the received data 711 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Distributor checks the number of agents, who VI. LITERATURE REVIEW have already received data. The guilt detection approach we present is related to Step: 4 Check for remaining agents the data provenance problem, tracing the lineage of S objects implies essentially the detection of the guilty Distributor chooses the remaining agents to send the agents. data. Distributor can increase the number of possible allocations by adding fake object.  Suggested solutions are domain specific, Step: 5 Select fake object again to allocate for such as lineage tracing for data warehouses remaining agents and assume some prior knowledge on the way a data view is created out of data Distributor chooses the random fake object to sources. allocate for the remaining agents. Step: 6 Estimate the probability value for guilt agent  Watermarks were initially used in images, To compute this probability, we need an estimate for video and audio data whose digital the probability that values can be “guessed” by the representation includes considerable target. redundancy. Watermarking is similar in the sense of providing agents with some kind of receiver-identifying information. However, V. WHY USE DATAMINING by its very nature, a watermark modifies the item being watermarked. If the object to be Data mining is the process of extracting patterns from watermarked cannot be modified then a data. Data mining is becoming an increasingly watermark cannot be inserted. In such cases important tool to transform the data into information. methods that attach watermarks to the It is commonly used in a wide range of profiling distributed data are not applicable. practices such as marketing, surveillance fraud detection and scientific discovery. Data mining can be used to uncover patterns in data but is often  Recently, works have also studied marks carried out only on samples of data. The mining insertion to relational data. process will be ineffective if the samples are not a good representation of the larger body of data. Data mining cannot discover patterns that may be present  There are also lots of other works on in the larger body of data if those patterns are not mechanisms that allow only authorized users present in the sample being "mined". Inability to find to access sensitive data through access patterns may become a cause for some disputes control policies. Such approaches prevent in between customers and service providers. Therefore some sense data leakage by sharing data mining is not foolproof but may be useful if information only with trusted parties. sufficiently representative data samples are collected. However, these policies are restrictive and The discovery of a particular pattern in a particular may make it impossible to satisfy agents’ set of data does not necessarily mean that a pattern is requests. found elsewhere in the larger data from which that sample was drawn. An important part of the process is the verification and validation of patterns on other samples of data 712 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Algorithm Results to find out Guilty Agents REFERENCES [1] R. Agrawal and J. Kiernan. Watermarking relational databases. In VLDB ’02: Proceedings of the 28th international conference on Very Large Data Bases, pages 155–166. VLDB Endowment, 2002. [2] P. Bonatti, S. D. C. di Vimercati, and P. Samarati. An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur., 5(1):1–35, 2002. [3] P. Buneman, S. Khanna, and W. C. Tan. Why and where: A characterization of data provenance. In J. V. den Bussche and V. Vianu, editors, Database Theory - ICDT 2001, 8th International Conference, London, UK, January 4-6, 2001, Proceedings, volume 1973 of Lecture Notes in Computer Science, pages 316–330. Springer, Note: a002 is the guilty agent. 2001. [4] P. Buneman and W.-C. Tan. Provenance in databases. In SIGMOD ’07: Proceedings of the 2007 ACM SIGMOD international conference on Management of data, pages 1171– Probability distribution of Agent Data 1173, New York, NY, USA, 2007. ACM. [5] Y. Cui and J. Widom. Lineage tracing for general data warehouse transformations. In The VLDB Journal, pages 471–480, 2001. [6] V. N. Murty. Counting the integer solutions of a linear equation with unit coefficients. Mathematics Magazine, 54(2):79–81, 1981. [7] P. Papadimitriou and H. Garcia-Molina. Data leakage detection.Technical report, Stanford University, 2008. [8] J. J. K. O. Ruanaidh, W. J. Dowling, and F. M. Boland. Watermarking digital images for copyright protection. I.E.E. Proceedings on Vision, Signal and Image Processing, 143(4):250– 256, 1996. [9] R. Sion, M. Atallah, and S. Prabhakar. Rights protection for relational data. In SIGMOD ’03: Proceedings of the 2003 ACM SIGMOD international conference on Management of data, pages 98–109, New York, NY, USA, 2003. ACM. [10] L. Sweeney. Achieving k-anonymity privacy protection usinggeneralization and suppression, 2002. 7. CONCLUSION The likelihood that an agent is responsible for a leak is [11] S. U. Nabar, B. Marthi, K. Kenthapadi, N. Mishra, and R. assessed, based on the overlap of his data with the leaked Motwani. Towards robustness in query auditing. In VLDB ’06: Proceedings of the 32nd international conference on Very large data and the data of other agents, and based on the data bases, pages 151–162. VLDB Endowment, 2006. probability that objects can be “guessed” by other means. The algorithms we have presented implement a variety of [12] P. M. Pardalos and S. A. Vavasis. Quadratic programming data distribution strategies that can improve the with one negative eigenvalue is np-hard. Journal of Global distributor’s chances of identifying a leaker. We have Optimization, 1(1):15–22, 1991. shown that distributing objects judiciously can make a significant difference in identifying guilty agents, especially in cases where there is large overlap in the data that agents must receive. 713 All Rights Reserved © 2012 IJARCET