SlideShare ist ein Scribd-Unternehmen logo
1 von 5
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit:
                  www.ocularsystems.in Or Call Us On 7385665306



                      Data Leakage Detection
ABSTRACT:

            A data distributor has given sensitive data to a set of supposedly
     trusted agents (third parties). Some of the data is leaked and found in an
     unauthorized place (e.g., on the web or somebody’s laptop). The
     distributor must assess the likelihood that the leaked data came from one or
     more agents, as opposed to having been independently gathered by other
     means. We propose data allocation strategies (across the agents) that
     improve the probability of identifying leakages. These methods do not rely
     on alterations of the released data (e.g., watermarks). In some cases we can
     also inject “realistic but fake” data records to further improve our chances
     of detecting leakage and identifying the guilty party.

EXISTING SYSTEM:

            Traditionally, leakage detection is handled by watermarking, e.g., a
     unique code is embedded in each distributed copy. If that copy is later
     discovered in the hands of an unauthorized party, the leaker can be
     identified. Watermarks can be very useful in some cases, but again,
     involve some modification of the original data. Furthermore, watermarks
     can sometimes be destroyed if the data recipient is malicious. E.g. A
     hospital may give patient records to researchers who will devise new
     treatments. Similarly, a company may have partnerships with other
     companies that require sharing customer data. Another enterprise may
     outsource its data processing, so data must be given to various other
     companies. We call the owner of the data the distributor and the
     supposedly trusted third parties the agents.


PROPOSED SYSTEM:

           Our goal is to detect when the distributor’s sensitive data has been
     leaked by agents, and if possible to identify the agent that leaked the data.
     Perturbation is a very useful technique where the data is modified and

 Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj,
                                        Pune-46
                             E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit:
                 www.ocularsystems.in Or Call Us On 7385665306


    made “less sensitive” before being handed to agents. we develop
    unobtrusive techniques for detecting leakage of a set of objects or records.

           In this section we develop a model for assessing the “guilt” of
    agents. We also present algorithms for distributing objects to agents, in a
    way that improves our chances of identifying a leaker. Finally, we also
    consider the option of adding “fake” objects to the distributed set. Such
    objects do not correspond to real entities but appear realistic to the agents.
    In a sense, the fake objects acts as a type of watermark for the entire set,
    without modifying any individual members. If it turns out an agent was
    given one or more fake objects that were leaked, then the distributor can be
    more confident that agent was guilty.




    Problem Setup and Notation:

           A distributor owns a set T={t1,
,tm}of valuable data objects. The
    distributor wants to share some of the objects with a set of agents U1,U2,

    Un, but does not wish the objects be leaked to other third parties. The
    objects in T could be of any type and size, e.g., they could be tuples in a
    relation, or relations in a database. An agent Ui receives a subset of
    objects, determined either by a sample request or an explicit request:

           1. Sample request
           2. Explicit request

Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj,
                                       Pune-46
                            E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit:
                  www.ocularsystems.in Or Call Us On 7385665306



     Guilt Model Analysis:

           our model parameters interact and to check if the interactions match
     our intuition, in this section we study two simple scenarios as Impact of
     Probability p and Impact of Overlap between Ri and S. In each scenario
     we have a target that has obtained all the distributor’s objects, i.e., T = S.

     Algorithms:

            1. Evaluation of Explicit Data Request Algorithms

                In the first place, the goal of these experiments was to see
                whether fake objects in the distributed data sets yield significant
                improvement in our chances of detecting a guilty agent. In the
                second place, we wanted to evaluate our e-optimal algorithm
                relative to a random allocation.
            2. Evaluation of Sample Data Request Algorithms

                With sample data requests agents are not interested in particular
                objects. Hence, object sharing is not explicitly defined by their
                requests. The distributor is “forced” to allocate certain objects to
                multiple agents only if the number of requested objects exceeds
                the number of objects in set T. The more data objects the agents
                request in total, the more recipients on average an object has; and
                the more objects are shared among different agents, the more
                difficult it is to detect a guilty agent.


MODULES:

            1. Data Allocation Module:

                  The main focus of our project is the data allocation problem
            as how can the distributor “intelligently” give data to agents in order
            to improve the chances of detecting a guilty agent,Admin can send

 Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj,
                                        Pune-46
                             E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit:
                 www.ocularsystems.in Or Call Us On 7385665306


           the files to the authenticated user, users can edit their account details
           etc. Agent views the secret key details through mail. In order to
           increase the chances of detecting agents that leak data.


           2. Fake Object Module:

                  The distributor creates and adds fake objects to the data that
           he distributes to agents. Fake objects are objects generated by the
           distributor in order to increase the chances of detecting agents that
           leak data. The distributor may be able to add fake objects to the
           distributed data in order to improve his effectiveness in detecting
           guilty agents. Our use of fake objects is inspired by the use of
           “trace” records in mailing lists. In case we give the wrong secret key
           to download the file, the duplicate file is opened, and that fake
           details also send the mail. Ex: The fake object details will display.


           3. Optimization Module:

                  The Optimization Module is the distributor’s data allocation
           to agents has one constraint and one objective. The agent’s
           constraint is to satisfy distributor’s requests, by providing them with
           the number of objects they request or with all available objects that
           satisfy their conditions. His objective is to be able to detect an agent
           who leaks any portion of his data. User can able to lock and unlock
           the files for secure.

           4. Data Distributor:

                 A data distributor has given sensitive data to a set of
           supposedly trusted agents (third parties). Some of the data is leaked
           and found in an unauthorized place (e.g., on the web or somebody’s
           laptop). The distributor must assess the likelihood that the leaked
           data came from one or more agents, as opposed to having been



Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj,
                                       Pune-46
                            E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit:
                  www.ocularsystems.in Or Call Us On 7385665306


            independently gathered by other means.Admin can able to view the
            which file is leaking and fake user’s details also.

Hardware Required:

                 System                :      Pentium IV 2.4 GHz
                 Hard Disk             :      40 GB
                 Floppy Drive          :      1.44 MB
                 Monitor               :      15 VGA colour
                 Mouse                 :       Logitech.
                 Keyboard              :      110 keys enhanced.
                 RAM                   :       256 MB



Software Required:

                 O/S                   :      Windows XP.
                 Language               :     Asp.Net, c#.
                 Data Base              :     Sql Server 2005




 Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj,
                                        Pune-46
                             E-Mail: info@ocularsystems.in

Weitere Àhnliche Inhalte

Andere mochten auch

Data leakage detection (synopsis)
Data leakage detection (synopsis)Data leakage detection (synopsis)
Data leakage detection (synopsis)Mumbai Academisc
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionSankhadip Kundu
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage PresentationMike Spaulding
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detectionChaitanya Kn
 
P2 Project
P2 ProjectP2 Project
P2 Project12341234666
 
thermal power station
thermal power stationthermal power station
thermal power stationHari Ohm Singh
 
training report NTPC Muzaffarpur Bihar
training report  NTPC Muzaffarpur Bihar training report  NTPC Muzaffarpur Bihar
training report NTPC Muzaffarpur Bihar Dilip kumar
 
Nikhil kumar project report ON NTPC KANTI
Nikhil kumar project report ON NTPC KANTINikhil kumar project report ON NTPC KANTI
Nikhil kumar project report ON NTPC KANTINikhil Singh
 
Data leakage detection
Data leakage detection Data leakage detection
Data leakage detection Suveeksha
 
Seminar_Report on EmoSPARK
Seminar_Report on EmoSPARKSeminar_Report on EmoSPARK
Seminar_Report on EmoSPARKANAND PRAKASH
 
Infrared thermography in civil engianeering
Infrared thermography in civil engianeeringInfrared thermography in civil engianeering
Infrared thermography in civil engianeeringakashpadole
 
Multi touch interaction
Multi touch interactionMulti touch interaction
Multi touch interactionParvika Singhal
 
main project doument
main project doumentmain project doument
main project doumentSunil Kotthakota
 
Multi touch technology
Multi touch technologyMulti touch technology
Multi touch technologySonuRana20111045
 

Andere mochten auch (15)

Data leakage detection (synopsis)
Data leakage detection (synopsis)Data leakage detection (synopsis)
Data leakage detection (synopsis)
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detection
 
Ultracane
Ultracane Ultracane
Ultracane
 
P2 Project
P2 ProjectP2 Project
P2 Project
 
thermal power station
thermal power stationthermal power station
thermal power station
 
training report NTPC Muzaffarpur Bihar
training report  NTPC Muzaffarpur Bihar training report  NTPC Muzaffarpur Bihar
training report NTPC Muzaffarpur Bihar
 
Nikhil kumar project report ON NTPC KANTI
Nikhil kumar project report ON NTPC KANTINikhil kumar project report ON NTPC KANTI
Nikhil kumar project report ON NTPC KANTI
 
Data leakage detection
Data leakage detection Data leakage detection
Data leakage detection
 
Seminar_Report on EmoSPARK
Seminar_Report on EmoSPARKSeminar_Report on EmoSPARK
Seminar_Report on EmoSPARK
 
Infrared thermography in civil engianeering
Infrared thermography in civil engianeeringInfrared thermography in civil engianeering
Infrared thermography in civil engianeering
 
Multi touch interaction
Multi touch interactionMulti touch interaction
Multi touch interaction
 
main project doument
main project doumentmain project doument
main project doument
 
Multi touch technology
Multi touch technologyMulti touch technology
Multi touch technology
 

Mehr von Ocular Systems

Buffer sizing for 802.11 based networks
Buffer sizing for 802.11 based networksBuffer sizing for 802.11 based networks
Buffer sizing for 802.11 based networksOcular Systems
 
Adaptive cluster distance bounding
Adaptive cluster distance boundingAdaptive cluster distance bounding
Adaptive cluster distance boundingOcular Systems
 
dotnet-applications-projects-BCA-BCS-Diploma
dotnet-applications-projects-BCA-BCS-Diplomadotnet-applications-projects-BCA-BCS-Diploma
dotnet-applications-projects-BCA-BCS-DiplomaOcular Systems
 
Networking ieee-project-topics-ocularsystems.in
Networking ieee-project-topics-ocularsystems.in Networking ieee-project-topics-ocularsystems.in
Networking ieee-project-topics-ocularsystems.in Ocular Systems
 
Image processing ieee-projects-ocularsystems.in-
Image processing ieee-projects-ocularsystems.in-Image processing ieee-projects-ocularsystems.in-
Image processing ieee-projects-ocularsystems.in-Ocular Systems
 
Advanced java-applications-projects-ocular systems.in-
Advanced java-applications-projects-ocular systems.in-Advanced java-applications-projects-ocular systems.in-
Advanced java-applications-projects-ocular systems.in-Ocular Systems
 

Mehr von Ocular Systems (7)

Vpidea 12
Vpidea 12Vpidea 12
Vpidea 12
 
Buffer sizing for 802.11 based networks
Buffer sizing for 802.11 based networksBuffer sizing for 802.11 based networks
Buffer sizing for 802.11 based networks
 
Adaptive cluster distance bounding
Adaptive cluster distance boundingAdaptive cluster distance bounding
Adaptive cluster distance bounding
 
dotnet-applications-projects-BCA-BCS-Diploma
dotnet-applications-projects-BCA-BCS-Diplomadotnet-applications-projects-BCA-BCS-Diploma
dotnet-applications-projects-BCA-BCS-Diploma
 
Networking ieee-project-topics-ocularsystems.in
Networking ieee-project-topics-ocularsystems.in Networking ieee-project-topics-ocularsystems.in
Networking ieee-project-topics-ocularsystems.in
 
Image processing ieee-projects-ocularsystems.in-
Image processing ieee-projects-ocularsystems.in-Image processing ieee-projects-ocularsystems.in-
Image processing ieee-projects-ocularsystems.in-
 
Advanced java-applications-projects-ocular systems.in-
Advanced java-applications-projects-ocular systems.in-Advanced java-applications-projects-ocular systems.in-
Advanced java-applications-projects-ocular systems.in-
 

KĂŒrzlich hochgeladen

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

KĂŒrzlich hochgeladen (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Data leakage detection

  • 1. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 Data Leakage Detection ABSTRACT: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases we can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party. EXISTING SYSTEM: Traditionally, leakage detection is handled by watermarking, e.g., a unique code is embedded in each distributed copy. If that copy is later discovered in the hands of an unauthorized party, the leaker can be identified. Watermarks can be very useful in some cases, but again, involve some modification of the original data. Furthermore, watermarks can sometimes be destroyed if the data recipient is malicious. E.g. A hospital may give patient records to researchers who will devise new treatments. Similarly, a company may have partnerships with other companies that require sharing customer data. Another enterprise may outsource its data processing, so data must be given to various other companies. We call the owner of the data the distributor and the supposedly trusted third parties the agents. PROPOSED SYSTEM: Our goal is to detect when the distributor’s sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data. Perturbation is a very useful technique where the data is modified and Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 2. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 made “less sensitive” before being handed to agents. we develop unobtrusive techniques for detecting leakage of a set of objects or records. In this section we develop a model for assessing the “guilt” of agents. We also present algorithms for distributing objects to agents, in a way that improves our chances of identifying a leaker. Finally, we also consider the option of adding “fake” objects to the distributed set. Such objects do not correspond to real entities but appear realistic to the agents. In a sense, the fake objects acts as a type of watermark for the entire set, without modifying any individual members. If it turns out an agent was given one or more fake objects that were leaked, then the distributor can be more confident that agent was guilty. Problem Setup and Notation: A distributor owns a set T={t1,
,tm}of valuable data objects. The distributor wants to share some of the objects with a set of agents U1,U2,
 Un, but does not wish the objects be leaked to other third parties. The objects in T could be of any type and size, e.g., they could be tuples in a relation, or relations in a database. An agent Ui receives a subset of objects, determined either by a sample request or an explicit request: 1. Sample request 2. Explicit request Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 3. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 Guilt Model Analysis: our model parameters interact and to check if the interactions match our intuition, in this section we study two simple scenarios as Impact of Probability p and Impact of Overlap between Ri and S. In each scenario we have a target that has obtained all the distributor’s objects, i.e., T = S. Algorithms: 1. Evaluation of Explicit Data Request Algorithms In the first place, the goal of these experiments was to see whether fake objects in the distributed data sets yield significant improvement in our chances of detecting a guilty agent. In the second place, we wanted to evaluate our e-optimal algorithm relative to a random allocation. 2. Evaluation of Sample Data Request Algorithms With sample data requests agents are not interested in particular objects. Hence, object sharing is not explicitly defined by their requests. The distributor is “forced” to allocate certain objects to multiple agents only if the number of requested objects exceeds the number of objects in set T. The more data objects the agents request in total, the more recipients on average an object has; and the more objects are shared among different agents, the more difficult it is to detect a guilty agent. MODULES: 1. Data Allocation Module: The main focus of our project is the data allocation problem as how can the distributor “intelligently” give data to agents in order to improve the chances of detecting a guilty agent,Admin can send Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 4. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 the files to the authenticated user, users can edit their account details etc. Agent views the secret key details through mail. In order to increase the chances of detecting agents that leak data. 2. Fake Object Module: The distributor creates and adds fake objects to the data that he distributes to agents. Fake objects are objects generated by the distributor in order to increase the chances of detecting agents that leak data. The distributor may be able to add fake objects to the distributed data in order to improve his effectiveness in detecting guilty agents. Our use of fake objects is inspired by the use of “trace” records in mailing lists. In case we give the wrong secret key to download the file, the duplicate file is opened, and that fake details also send the mail. Ex: The fake object details will display. 3. Optimization Module: The Optimization Module is the distributor’s data allocation to agents has one constraint and one objective. The agent’s constraint is to satisfy distributor’s requests, by providing them with the number of objects they request or with all available objects that satisfy their conditions. His objective is to be able to detect an agent who leaks any portion of his data. User can able to lock and unlock the files for secure. 4. Data Distributor: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 5. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 independently gathered by other means.Admin can able to view the which file is leaking and fake user’s details also. Hardware Required:  System : Pentium IV 2.4 GHz  Hard Disk : 40 GB  Floppy Drive : 1.44 MB  Monitor : 15 VGA colour  Mouse : Logitech.  Keyboard : 110 keys enhanced.  RAM : 256 MB Software Required:  O/S : Windows XP.  Language : Asp.Net, c#.  Data Base : Sql Server 2005 Ocular Systems, Shop No:1, Swagat Corner Building, Near Narayani Dham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in