SlideShare a Scribd company logo
1 of 10
Data Leakage Detection

(Synopsis)
ABSTRACT:
We study the following problem: A data distributor has given sensitive
data to a set of supposedly trusted agents (third parties). Some of the data
is leaked and found in an unauthorized place (e.g., on the web or
somebodyā€™s laptop). The distributor must assess the likelihood that the
leaked data came from one or more agents, as opposed to having been
independently gathered by other means. We propose data allocation
strategies (across the agents) that improve the probability of identifying
leakages. These methods do not rely on alterations of the released data
(e.g., watermarks). In some cases we can also inject ā€œrealistic but fakeā€ data
records to further improve our chances of detecting leakage and identifying
the guilty party.

Objective
The objective of the system is to detect when the distributorā€™s
sensitive data has been leaked by hackers, and if possible to identify the
agent that leaked the data.
Existing System
The Existing System can detect the hackers but the total no of cookies
(evidence) will be less and the organization may not be able to proceed
legally for further proceedings due to lack of good amount of cookies and the
chances to escape of hackers are high.

Proposed system
In the Proposed System the hackers can be traced with good amount
of evidence. In this proposed system the leakage of data is detected by
the following methods viz.., generating Fake objects, Watermarking and
by Encrypting the data.

Modules:
Module1

: Administrator Module

Module 2

: Employees Module

Module 3

: Data Leakage Detection Module
Administrator Module:
All the privileges of the website are only available with the administrator.
Admin has privileges to accomplish the following responsibilities/tasks:
ā€¢

Manage

Users

(Add,

Edit,

Delete,

Lock/Unlock,

Assign

Permissions).
ā€¢

Manage Articles (Add, Edit, Update, Delete).

ā€¢

Manage Categories (Add, Edit, Update, Delete).

ā€¢

Send Messages

ā€¢

Upload Documents

Employee Module:
Some of the privileges are restricted to the employee by the administrator.
Only few permissions are available with the employees. Employees have the
following task/responsibilities. Employees have Read-only access to the
content.
ā€¢

Employees can Read the articles

ā€¢

Download the Documents

ā€¢

Read the messages which are send by the Admin

ā€¢

Discuss the content in the Discussion Board.
Data Leakage Detection:
The main scope of this module is provide complete information about the
data/content that is accessed by the users within the website.
ā€¢

Forms Authentication technique is used to provide security to the
website in order to prevent the leakage of the data.

ā€¢

Continuous observation is made automatically and the information is
send to the administrator so that he can identify whenever the data is
leaked.

ā€¢

Above all the important aspect providing proof against the Guilty
Objects. The following techniques are used.
o Fake Object Generation.
o Watermarking.
Flow Char for implementation of the following Alogirhtms:
(a)Allocation for Explict Data Request(EF) with fake objects
(b) Agent Selection for e-random and e-optimal
ā€œIN Both the above case

Start

CREATEFAKCEOBJECT()
METHOD GENERATES A
FAKEOBJECT.ā€

User Request
R Explicit

Check the Condition
Select the agent and
add the fake.
IF B> 0

object
Evaluate The Loop.
Create Fake Object is Invoked

Loop Iterates for n
number of requests

User Receives the
Output.

Stop

Else

Exit
Flow Char for implementation of the following Alogirhtms:
(a) Allocation for Sample Data Request(EF) without any fake objects:
(b) Agent Selection for e-random and e-optimal
ā€œIn Both the following cases Select Method() returns the value of āˆ‘ Ri n Rj ā€œ
Start

User Request
R Explicit
Check the Condition
Select the agent and
add the fake.
Loop Iterates for n
number of requests

IF B> 0
Evaluate The Loop.
User Receives the
Stop
SelectObject() Method is Invoked
Output.

Else

Exit
object

HARDWARE AND SOFTWARE REQUIREMENTS

Software Requirements:
Language

: Servlets, JSP

Technologies

: JAVA

IDE

: Visual Studio 2008

Operating System

: Microsoft Windows XP SP2 or Later Version

Hardware Requirements:
Processor

: Intel Pentium or more
RAM

: 512 MB (Minimum)

Hard Disk

: 40 GB
RAM

: 512 MB (Minimum)

Hard Disk

: 40 GB

More Related Content

What's hot

Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete SeminarSumit Thakur
Ā 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionSankhadip Kundu
Ā 
Association rule mining.pptx
Association rule mining.pptxAssociation rule mining.pptx
Association rule mining.pptxmaha797959
Ā 
Fake News detection.pptx
Fake News detection.pptxFake News detection.pptx
Fake News detection.pptxSanad Bhowmik
Ā 
Data Mining: Graph mining and social network analysis
Data Mining: Graph mining and social network analysisData Mining: Graph mining and social network analysis
Data Mining: Graph mining and social network analysisDataminingTools Inc
Ā 
Statistical Software Quality Assurance.pptx
Statistical Software Quality Assurance.pptxStatistical Software Quality Assurance.pptx
Statistical Software Quality Assurance.pptxKarthigaiSelviS3
Ā 
Object Oriented Analysis and Design
Object Oriented Analysis and DesignObject Oriented Analysis and Design
Object Oriented Analysis and DesignDr. C.V. Suresh Babu
Ā 
Additional themes of data mining for Msc CS
Additional themes of data mining for Msc CSAdditional themes of data mining for Msc CS
Additional themes of data mining for Msc CSThanveen
Ā 
Data mining primitives
Data mining primitivesData mining primitives
Data mining primitiveslavanya marichamy
Ā 
Data mining: Concepts and Techniques, Chapter12 outlier Analysis
Data mining: Concepts and Techniques, Chapter12 outlier Analysis Data mining: Concepts and Techniques, Chapter12 outlier Analysis
Data mining: Concepts and Techniques, Chapter12 outlier Analysis Salah Amean
Ā 
3.7 outlier analysis
3.7 outlier analysis3.7 outlier analysis
3.7 outlier analysisKrish_ver2
Ā 
Multidimensional data models
Multidimensional data  modelsMultidimensional data  models
Multidimensional data models774474
Ā 
secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.Venkat Projects
Ā 
Fragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed DatabaseFragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed DatabaseAbhilasha Lahigude
Ā 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics KakshaPatel3
Ā 

What's hot (20)

Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete Seminar
Ā 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
Ā 
Association rule mining.pptx
Association rule mining.pptxAssociation rule mining.pptx
Association rule mining.pptx
Ā 
Fake News detection.pptx
Fake News detection.pptxFake News detection.pptx
Fake News detection.pptx
Ā 
DFD ppt
DFD pptDFD ppt
DFD ppt
Ā 
Data Mining: Graph mining and social network analysis
Data Mining: Graph mining and social network analysisData Mining: Graph mining and social network analysis
Data Mining: Graph mining and social network analysis
Ā 
Statistical Software Quality Assurance.pptx
Statistical Software Quality Assurance.pptxStatistical Software Quality Assurance.pptx
Statistical Software Quality Assurance.pptx
Ā 
Object Oriented Analysis and Design
Object Oriented Analysis and DesignObject Oriented Analysis and Design
Object Oriented Analysis and Design
Ā 
Additional themes of data mining for Msc CS
Additional themes of data mining for Msc CSAdditional themes of data mining for Msc CS
Additional themes of data mining for Msc CS
Ā 
DFD Slides
DFD SlidesDFD Slides
DFD Slides
Ā 
Distributed System - Security
Distributed System - SecurityDistributed System - Security
Distributed System - Security
Ā 
Data mining primitives
Data mining primitivesData mining primitives
Data mining primitives
Ā 
Data mining: Concepts and Techniques, Chapter12 outlier Analysis
Data mining: Concepts and Techniques, Chapter12 outlier Analysis Data mining: Concepts and Techniques, Chapter12 outlier Analysis
Data mining: Concepts and Techniques, Chapter12 outlier Analysis
Ā 
3.7 outlier analysis
3.7 outlier analysis3.7 outlier analysis
3.7 outlier analysis
Ā 
Multidimensional data models
Multidimensional data  modelsMultidimensional data  models
Multidimensional data models
Ā 
secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.secure data transfer and deletion from counting bloom filter in cloud computing.
secure data transfer and deletion from counting bloom filter in cloud computing.
Ā 
Fragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed DatabaseFragmentation and types of fragmentation in Distributed Database
Fragmentation and types of fragmentation in Distributed Database
Ā 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics
Ā 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Ā 
Dempster shafer theory
Dempster shafer theoryDempster shafer theory
Dempster shafer theory
Ā 

Similar to Data leakage detection (synopsis)

Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionAjitkaur saini
Ā 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionbunnz12345
Ā 
83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.pptnaresh2004s
Ā 
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdfDrog3
Ā 
Privacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage SystemPrivacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage SystemKumar Goud
Ā 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageeSAT Publishing House
Ā 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageeSAT Journals
Ā 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemZTech Proje
Ā 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
Ā 
Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016Andrew McNicol
Ā 
Dn31538540
Dn31538540Dn31538540
Dn31538540IJMER
Ā 
DLD_SYNOPSIS
DLD_SYNOPSISDLD_SYNOPSIS
DLD_SYNOPSISNisha Jain
Ā 
Andrew and Zac RVA-Beyond-Automated-Testing-2016.ppt
Andrew and Zac RVA-Beyond-Automated-Testing-2016.pptAndrew and Zac RVA-Beyond-Automated-Testing-2016.ppt
Andrew and Zac RVA-Beyond-Automated-Testing-2016.pptBUSHRASHAIKH804312
Ā 
Secure Code Warrior - Robust error checking
Secure Code Warrior - Robust error checkingSecure Code Warrior - Robust error checking
Secure Code Warrior - Robust error checkingSecure Code Warrior
Ā 
Final review m score
Final review m scoreFinal review m score
Final review m scoreazhar4010
Ā 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityHappiest Minds Technologies
Ā 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public InvestigationsCTIN
Ā 
IRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET Journal
Ā 
In your role as a highly paid consultant, you are given a list of.docx
In your role as a highly paid consultant, you are given a list of.docxIn your role as a highly paid consultant, you are given a list of.docx
In your role as a highly paid consultant, you are given a list of.docxdoylymaura
Ā 

Similar to Data leakage detection (synopsis) (20)

Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
Ā 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
Ā 
83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt
Ā 
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
Ā 
Privacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage SystemPrivacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage System
Ā 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakage
Ā 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakage
Ā 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering system
Ā 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
Ā 
Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016
Ā 
Dn31538540
Dn31538540Dn31538540
Dn31538540
Ā 
DLD_SYNOPSIS
DLD_SYNOPSISDLD_SYNOPSIS
DLD_SYNOPSIS
Ā 
Andrew and Zac RVA-Beyond-Automated-Testing-2016.ppt
Andrew and Zac RVA-Beyond-Automated-Testing-2016.pptAndrew and Zac RVA-Beyond-Automated-Testing-2016.ppt
Andrew and Zac RVA-Beyond-Automated-Testing-2016.ppt
Ā 
Secure Code Warrior - Robust error checking
Secure Code Warrior - Robust error checkingSecure Code Warrior - Robust error checking
Secure Code Warrior - Robust error checking
Ā 
Final review m score
Final review m scoreFinal review m score
Final review m score
Ā 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Ā 
spamzombieppt
spamzombiepptspamzombieppt
spamzombieppt
Ā 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public Investigations
Ā 
IRJET- Data Leakage Detection System
IRJET- Data Leakage Detection SystemIRJET- Data Leakage Detection System
IRJET- Data Leakage Detection System
Ā 
In your role as a highly paid consultant, you are given a list of.docx
In your role as a highly paid consultant, you are given a list of.docxIn your role as a highly paid consultant, you are given a list of.docx
In your role as a highly paid consultant, you are given a list of.docx
Ā 

More from Mumbai Academisc

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list Mumbai Academisc
Ā 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list Mumbai Academisc
Ā 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list Mumbai Academisc
Ā 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list Mumbai Academisc
Ā 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Mumbai Academisc
Ā 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list Mumbai Academisc
Ā 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects listMumbai Academisc
Ā 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects listMumbai Academisc
Ā 
Java web programming
Java web programmingJava web programming
Java web programmingMumbai Academisc
Ā 
Java programming-examples
Java programming-examplesJava programming-examples
Java programming-examplesMumbai Academisc
Ā 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsMumbai Academisc
Ā 
Web based development
Web based developmentWeb based development
Web based developmentMumbai Academisc
Ā 
Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4Mumbai Academisc
Ā 
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3Mumbai Academisc
Ā 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2Mumbai Academisc
Ā 

More from Mumbai Academisc (20)

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list
Ā 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list
Ā 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
Ā 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
Ā 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
Ā 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
Ā 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
Ā 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
Ā 
Spring ppt
Spring pptSpring ppt
Spring ppt
Ā 
Ejb notes
Ejb notesEjb notes
Ejb notes
Ā 
Java web programming
Java web programmingJava web programming
Java web programming
Ā 
Java programming-examples
Java programming-examplesJava programming-examples
Java programming-examples
Ā 
Hibernate tutorial
Hibernate tutorialHibernate tutorial
Hibernate tutorial
Ā 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
Ā 
Web based development
Web based developmentWeb based development
Web based development
Ā 
Jdbc
JdbcJdbc
Jdbc
Ā 
Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4
Ā 
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3
Ā 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2
Ā 
Engineering
EngineeringEngineering
Engineering
Ā 

Recently uploaded

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
Ā 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
Ā 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
Ā 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
Ā 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
Ā 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
Ā 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
Ā 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
Ā 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
Ā 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
Ā 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
Ā 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
Ā 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
Ā 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜RTylerCroy
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
Ā 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
Ā 
Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024The Digital Insurer
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
Ā 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Ā 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Ā 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Ā 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Ā 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Ā 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Ā 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Ā 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Ā 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Ā 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Ā 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Ā 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
Ā 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Ā 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Ā 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Ā 
Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Ā 

Data leakage detection (synopsis)

  • 2. ABSTRACT: We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebodyā€™s laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases we can also inject ā€œrealistic but fakeā€ data records to further improve our chances of detecting leakage and identifying the guilty party. Objective The objective of the system is to detect when the distributorā€™s sensitive data has been leaked by hackers, and if possible to identify the agent that leaked the data.
  • 3. Existing System The Existing System can detect the hackers but the total no of cookies (evidence) will be less and the organization may not be able to proceed legally for further proceedings due to lack of good amount of cookies and the chances to escape of hackers are high. Proposed system In the Proposed System the hackers can be traced with good amount of evidence. In this proposed system the leakage of data is detected by the following methods viz.., generating Fake objects, Watermarking and by Encrypting the data. Modules: Module1 : Administrator Module Module 2 : Employees Module Module 3 : Data Leakage Detection Module
  • 4. Administrator Module: All the privileges of the website are only available with the administrator. Admin has privileges to accomplish the following responsibilities/tasks: ā€¢ Manage Users (Add, Edit, Delete, Lock/Unlock, Assign Permissions). ā€¢ Manage Articles (Add, Edit, Update, Delete). ā€¢ Manage Categories (Add, Edit, Update, Delete). ā€¢ Send Messages ā€¢ Upload Documents Employee Module: Some of the privileges are restricted to the employee by the administrator. Only few permissions are available with the employees. Employees have the following task/responsibilities. Employees have Read-only access to the content. ā€¢ Employees can Read the articles ā€¢ Download the Documents ā€¢ Read the messages which are send by the Admin ā€¢ Discuss the content in the Discussion Board.
  • 5. Data Leakage Detection: The main scope of this module is provide complete information about the data/content that is accessed by the users within the website. ā€¢ Forms Authentication technique is used to provide security to the website in order to prevent the leakage of the data. ā€¢ Continuous observation is made automatically and the information is send to the administrator so that he can identify whenever the data is leaked. ā€¢ Above all the important aspect providing proof against the Guilty Objects. The following techniques are used. o Fake Object Generation. o Watermarking.
  • 6. Flow Char for implementation of the following Alogirhtms: (a)Allocation for Explict Data Request(EF) with fake objects (b) Agent Selection for e-random and e-optimal ā€œIN Both the above case Start CREATEFAKCEOBJECT() METHOD GENERATES A FAKEOBJECT.ā€ User Request R Explicit Check the Condition Select the agent and add the fake. IF B> 0 object Evaluate The Loop. Create Fake Object is Invoked Loop Iterates for n number of requests User Receives the Output. Stop Else Exit
  • 7. Flow Char for implementation of the following Alogirhtms: (a) Allocation for Sample Data Request(EF) without any fake objects: (b) Agent Selection for e-random and e-optimal ā€œIn Both the following cases Select Method() returns the value of āˆ‘ Ri n Rj ā€œ Start User Request R Explicit Check the Condition Select the agent and add the fake. Loop Iterates for n number of requests IF B> 0 Evaluate The Loop. User Receives the Stop SelectObject() Method is Invoked Output. Else Exit
  • 8. object HARDWARE AND SOFTWARE REQUIREMENTS Software Requirements: Language : Servlets, JSP Technologies : JAVA IDE : Visual Studio 2008 Operating System : Microsoft Windows XP SP2 or Later Version Hardware Requirements: Processor : Intel Pentium or more
  • 9. RAM : 512 MB (Minimum) Hard Disk : 40 GB
  • 10. RAM : 512 MB (Minimum) Hard Disk : 40 GB