modules

15
Data leakage detectioN Team members: S.VIJAYAKUMAR T.DINESHCHAND R.GOBINATH K.BARATHKUMAR Team Guide : B.Sivanandhan (AP/CSE)

Upload: gobigopsrulz

Post on 19-Nov-2015

228 views

Category:

Documents


0 download

DESCRIPTION

data leakage detection

TRANSCRIPT

DATA LEAKAGE DETECTION

Data leakage detectioN Team members: S.VIJAYAKUMAR T.DINESHCHANDRAN R.GOBINATH K.BARATHKUMARTeam Guide : B.Sivanandhan (AP/CSE)

DATA LEAKAGE DETECTIONABSTRACT:A data distributor has given sensitive data to a set of supposedly trusted agents. Sometimes data is leaked and found in unauthorized place e.g., on the web or on somebody's laptop. For example, a hospital may give patient records to researchers who will devise new treatments. Similarly, a company may have partnerships with other companies that require sharing customer data. Another enterprise may outsource its data processing, so data might be given to various other companies. The owner of the data are called as distributors and the trusted third parties are called as agents.

Data leakage happens every day when confidential business information such as customer or patient data, company secrets, budget information etc..are leaked out. when these information are leaked out, then the companies are at serious risk. Most probably data are being leaked from agents side. So , company have to very careful while distributing such a data to an agents. The Goal of Our project is to analyze how the distributer can allocate the confidential data to the Agents so that the leakage of data would be minimized to a GreaterExtent by finding an guilty agent.

DATA LEAKAGE detection

INTRODUCTION

EXISTING SYSTEM PROPOSED SYSTEMARCHITECTURE DIAGRAMIMPLEMENTATIONSCONCLUSION

INTRODUCTION

In the course of doingbusiness, sometimessensitive data must be handed over to supposedlytrusted third parties. Our goal is to detect when the distributor's sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data.

PROPOSED SYSTEM . In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties. Our goal is to detect when thedistributor's sensitive data has beenleaked by agents, and if possible toidentify the agent that leaked the data.

MODULESData Allocation Module Fake Object Module Optimization Module Data Distributor Module Agent Guilt Module

DATA ALLOCATION MODULE

The main focus of our project is the dataallocation problem as how can the distributorintelligently give data to agents in order to improve thechances of detecting a guilty agent, Admin can send thefiles to the authenticated user, users can edit their accountdetails etc. Agent views the secret key details throughmail. In order to increase the chances of detecting agentsthat leak data.

FAKE OBJECT MODULE

The distributor creates and adds fake objects tothe data that he distributes to agents. Fake objects areobjects generated by the distributor in order to increasethe chances of detecting agents that leak data. Thedistributor may be able to add fake objects to thedistributed data in order to improve his effectiveness indetecting guilty agents. Our use of fake objects isinspired by the use of trace records in mailing lists. Incase we give the wrong secret key to download the file,the duplicate file is opened, and that fake details alsosend the mail. Ex: The fake object details will display

Optimization Module The Optimization Module is the distributorsdata allocation to agents has one constraint and oneobjective. The agents constraint is to satisfy distributorsrequests, by providing them with the number of objectsthey request or with all available objects that satisfy theirconditions. His objective is to be able to detect an agentwho leaks any portion of his data. User can able to lockand unlock the files for secure.

Internet

The Sent e-mail dont contains fake Object/Watermarks.

Forwarded to the outside worldAgent tries to leak the sensitive dataARCHITECTURE DIAGRAM:

11

The Sent e-mail contains fake Object/Watermarks.Internet

Infected e-mail containing fake objectNotification is sentAgent tries to leak the sensitive data

12

ImplementationThe system has the following

Data Allocation -- approach same as watermarking -- less sensitive -- add fake object in some cases

Fake Object -- Are real looking object -- Should not affect data -- Limit on fake object insertion(e-mail inbox) -- CREATEFAKEOBJECT (Ri, Fi, CONDi)

CONCLUSIONIn the real scenario there is no need to hand over the sensitive data to the agents who will unknowingly or maliciously leak it.

However, in many cases, we must indeed work with agents that may not be 100 percent trusted, and we may not be certain if a leaked object came from an agent or from some other source.

In spite of these difficulties, it is possible to assess the likelihood that an agent is responsible for a leak, based on the overlap of his data with the leaked data .

The algorithms we have presented implement a variety of data distribution strategies that can improve the distributors chances of identifying a leaker.

14