Вы находитесь на странице: 1из 17

Lecturer - IT

Mr.J.Britto Dennis M-Tech


By

Under The Guidance Of

P.Karthikeyan A.Karthik J.Ashok kumar A.Arul vimal Antony

Final IT DSEC.

A data distributor has given sensitive data to a set of supposedly trusted agents but some of the data is leaked and found in an unauthorized place. Our goal is to detect when the distributors sensitive data has been leaked by agents, and to identify the agent who leaked data. We propose data allocation strategies and implement algorithms with fake objects.

Data sharing is more important in business. sometimes sensitive data must be handed over to trusted third parties. A data distributor give their data to agents. The data may be leaked by agents. The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means.

WATERMARKING:

Unique code is embedded in each distributed copy. If that copy is later discovered in the hands of an unauthorized party, the leaker can be identified . A watermarking is mainly used for embedding or hiding the information.

Some modification of the original data. Watermarks can sometimes be destroyed if the data recipient is malicious. If the watermarked copy is found at some

unauthorized site ,then distributor can claim


his ownership.

Data allocation strategies: Two algorithms are present in this allocation strategies. Sample data request Explicit data request Fake objects: Does not correspond to real entities but appear realistic to the agents. Fake objects are created by data distributor and it consist of set of objects, subset of fake objects and conditions.

Complex to identify the fake objects .

Difficult to remove fake objects from distributed


objects by agents.

Avoid sending more data.

ALGORITHM

4
AGENT 1

EXPLICIT DATA REQUEST SAMPLE DATA REQUEST

2
LEAKAGE

DATA

1
OPTI MIZA TION

5
IDENTIFYING THE PROBABILITY OF LEAKAGE

AGENT 2

DISTR IBUT OR

AGENT 3

ORIGINAL DATA+FAKE OBJECTS

AGENT 4

LEAKAGE

6
DETECT THE GUILTY AGENT

DATA OBJECT

Data Distributor Module


Optimization Module Fake Object Module

Data Allocation Module

A data distributor has given sensitive data to trusted agents. Some of the data is leaked and found in an unauthorized place. The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means.

The Optimization Module is the distributors data allocation to agents has one constraint and one objective. The distributors constraint is to satisfy agents requests, by providing them with the number of objects . Objective is to be able to detect an agent who leaks any portion of his data.

The distributor may be able to add fake objects to the distributed data in order to improve his effectiveness in detecting guilty agents. Use of fake objects is inspired by the use of trace records in mailing lists. Function : CreateFakeObject(Ri,Fi,condi).

How can the distributor intelligently give data to agents in order to improve the chances of detecting a guilty agent. Allocation based on sample data request and explicit data request.

We are not using access control policies because it allows only authorized users to access the sensitive data. However , these polices are restrictive and may make it impossible to satisfy agents requests.

P. Papadimitriou and H. Garcia-Molina, Data leakage detection, IEEE Transactions on Knowledge and Data Engineering. S. Czerwinski, R. Fromm, and T. Hodes. Digital music distribution and audio watermarking. L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression.

Вам также может понравиться