Академический Документы
Профессиональный Документы
Культура Документы
Agenda
PROBLEM DEFINITION INTRODUCTION ISSUES SCOPE ANALYSIS DESIGN IMPLEMENTATIONS
Problem Definition
To detect whether data has been leaked by agents. To prevent data leakage .
Introduction
In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties. Our goal is to detect when the distributor's sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data.
Existing System
Proposed System
Analysis
Problem Setup and Notation
Distributor (D) is a system which will distribute data to agents Valuable Data (T) is the set of sensitive data which the system is going
to send to the agents Agent (U) is the set of agents to whom the system is going to send sensitive data. Request from client will be either sample request or explicit request.
In this algorithm, the agent receives the entire data object that satisfies the condition of the agents data request. The following algorithm shows the working of Explicit Data Request:
With sample data requests, agents are not interested in particular objects. In this algorithm, the agent receives only the subset of data object that can be given. The working of Sample Data Request algorithm is same as the working of Explicit Data Request.
ARCHITECTURE DIAGRAM:
Data Distributor
Agents
ARCHITECTURE DIAGRAM:
Data Distributor
Agents
Internet
Internet
Data Allocation -- approach same as watermarking -- less sensitive -- add fake object in some cases
Fake Object -- Are real looking object -- Should not affect data -- Limit on fake object insertion(e-mail inbox) -- CREATEFAKEOBJECT (Ri, Fi, CONDi)
Algorithm:
1.Identify the data. 2.Remove spamming stopping words. 3.Remove or change the synonyms. 4.Calculate the priority of the word depending upon the sensitivity of the data.
Agent
: : :
: : : : : :
Pentium IV 2.4 GHz 40 GB 15 VGA colour Logitech. 110 keys enhanced. 256 MB
In the real scenario there is no need to hand over the sensitive data to the
R. Agrawal and J. Kiernan, Watermarking Relational Databases,Proc. 28th Intl Conf. Very Large Data Bases (VLDB 02), VLDB.Endowment, pp. 155-166, 2002. S. Czerwinski, R. Fromm, and T. Hodes, Digital Music Distribution and Audio Watermarking, http://www.scientificcommons. org/43025658, 2007. F. Guo, J. Wang, Z. Zhang, X. Ye, and D. Li, An Improved Algorithm to Watermark Numeric Relational Data, Information Security Applications, pp. 138149, Springer, 2006. S. Jajodia, P. Samarati, M.L. Sapino, and V.S. Subrahmanian, Flexible Support for Multiple Access Control Policies, ACM Trans. Database Systems, vol. 26, no. 2, pp. 214-260, 2001. Panagiotis Papadimitriou and Hector Garcia-Molina, Data Leakage Detection, IEEE Transactions on Knowledge and Data Engineering, Vol 23, No.1 January 2011. B. Mungamuru and H. Garcia-Molina, Privacy, Preservation and Performance: The 3 Ps of Distributed Data Management, technical report, Stanford Univ., 2008.