Enviar búsqueda
Cargar
709 713
•
0 recomendaciones
•
389 vistas
E
Editor IJARCET
Seguir
Tecnología
Arte y fotografía
Denunciar
Compartir
Denunciar
Compartir
1 de 5
Descargar ahora
Descargar para leer sin conexión
Recomendados
Jpdcs1(data lekage detection)
Jpdcs1(data lekage detection)
Chaitanya Kn
547 551
547 551
Editor IJARCET
Modeling and Detection of Data Leakage Fraud
Modeling and Detection of Data Leakage Fraud
IOSR Journals
Data leakage detection
Data leakage detection
Mohit Pandey
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
redpel dot com
Blue Canopy Semantic Web Approach v25 brief
Blue Canopy Semantic Web Approach v25 brief
Nick Savage
Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...
dbpublications
Sub1555
Sub1555
International Journal of Science and Research (IJSR)
Recomendados
Jpdcs1(data lekage detection)
Jpdcs1(data lekage detection)
Chaitanya Kn
547 551
547 551
Editor IJARCET
Modeling and Detection of Data Leakage Fraud
Modeling and Detection of Data Leakage Fraud
IOSR Journals
Data leakage detection
Data leakage detection
Mohit Pandey
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
redpel dot com
Blue Canopy Semantic Web Approach v25 brief
Blue Canopy Semantic Web Approach v25 brief
Nick Savage
Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...
dbpublications
Sub1555
Sub1555
International Journal of Science and Research (IJSR)
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
IOSR Journals
Electronic Document Management And Discovery
Electronic Document Management And Discovery
Ronald Coleman
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Mining
wanani181
ANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATION
pharmaindexing
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
CallPM
What is data_science
What is data_science
idris2
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
IOSR Journals
Case study nuix edrm enron data set
Case study nuix edrm enron data set
Nuix
The Investigative Lab - Nuix
The Investigative Lab - Nuix
Nuix
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
IOSR Journals
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330
Jim Kramer
Information Management and Analytics
Information Management and Analytics
AKAGroup
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital Age
Sherpa Software
NogaLogic-DataClassification&Governace&BusinessIntelligence
NogaLogic-DataClassification&Governace&BusinessIntelligence
Giuliano Bonassi
Big Data: 8 facts and 8 fictions
Big Data: 8 facts and 8 fictions
The Marketing Distillery
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentation
iWriteEssays
Information security in big data -privacy and data mining
Information security in big data -privacy and data mining
harithavijay94
Ediscovery 101
Ediscovery 101
Catherine A. Casey (CEDS)
How to protect the cookies once someone gets into the cookie jar
How to protect the cookies once someone gets into the cookie jar
JudgeEagle
690 698
690 698
Editor IJARCET
129 134
129 134
Editor IJARCET
347 352
347 352
Editor IJARCET
Más contenido relacionado
La actualidad más candente
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
IOSR Journals
Electronic Document Management And Discovery
Electronic Document Management And Discovery
Ronald Coleman
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Mining
wanani181
ANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATION
pharmaindexing
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
CallPM
What is data_science
What is data_science
idris2
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
IOSR Journals
Case study nuix edrm enron data set
Case study nuix edrm enron data set
Nuix
The Investigative Lab - Nuix
The Investigative Lab - Nuix
Nuix
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
IOSR Journals
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330
Jim Kramer
Information Management and Analytics
Information Management and Analytics
AKAGroup
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital Age
Sherpa Software
NogaLogic-DataClassification&Governace&BusinessIntelligence
NogaLogic-DataClassification&Governace&BusinessIntelligence
Giuliano Bonassi
Big Data: 8 facts and 8 fictions
Big Data: 8 facts and 8 fictions
The Marketing Distillery
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentation
iWriteEssays
Information security in big data -privacy and data mining
Information security in big data -privacy and data mining
harithavijay94
Ediscovery 101
Ediscovery 101
Catherine A. Casey (CEDS)
How to protect the cookies once someone gets into the cookie jar
How to protect the cookies once someone gets into the cookie jar
JudgeEagle
La actualidad más candente
(19)
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Electronic Document Management And Discovery
Electronic Document Management And Discovery
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Mining
ANONYMIZATION OF PRIVACY PRESERVATION
ANONYMIZATION OF PRIVACY PRESERVATION
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
What is data_science
What is data_science
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Case study nuix edrm enron data set
Case study nuix edrm enron data set
The Investigative Lab - Nuix
The Investigative Lab - Nuix
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330
Information Management and Analytics
Information Management and Analytics
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital Age
NogaLogic-DataClassification&Governace&BusinessIntelligence
NogaLogic-DataClassification&Governace&BusinessIntelligence
Big Data: 8 facts and 8 fictions
Big Data: 8 facts and 8 fictions
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentation
Information security in big data -privacy and data mining
Information security in big data -privacy and data mining
Ediscovery 101
Ediscovery 101
How to protect the cookies once someone gets into the cookie jar
How to protect the cookies once someone gets into the cookie jar
Destacado
690 698
690 698
Editor IJARCET
129 134
129 134
Editor IJARCET
347 352
347 352
Editor IJARCET
79 81
79 81
Editor IJARCET
119 128
119 128
Editor IJARCET
Pdf5
Pdf5
Editor IJARCET
87 90
87 90
Editor IJARCET
11 15
11 15
Editor IJARCET
Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Editor IJARCET
Destacado
(9)
690 698
690 698
129 134
129 134
347 352
347 352
79 81
79 81
119 128
119 128
Pdf5
Pdf5
87 90
87 90
11 15
11 15
Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Similar a 709 713
Data leakage detection
Data leakage detection
rejii
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
Drog3
Jpdcs1 data leakage detection
Jpdcs1 data leakage detection
Chaitanya Kn
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage Detection
IOSR Journals
Data leakage detection Complete Seminar
Data leakage detection Complete Seminar
Sumit Thakur
Dn31538540
Dn31538540
IJMER
Data leakage detection
Data leakage detection
bunnz12345
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
IOSR Journals
Data Leakage Detection
Data Leakage Detection
Ashwini Nerkar
Privacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage System
Kumar Goud
DLD_SYNOPSIS
DLD_SYNOPSIS
Nisha Jain
Data leakage detection
Data leakage detection
kalpesh1908
Data leakage detection
Data leakage detection
Ajitkaur saini
Data leakage detection
Data leakage detection
gaurav kumar
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
naresh2004s
dataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptx
naresh2004s
IRJET- Data Leakage Detection System
IRJET- Data Leakage Detection System
IRJET Journal
83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt
naresh2004s
Data leakage detection
Data leakage detection
Sankhadip Kundu
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakage
eSAT Publishing House
Similar a 709 713
(20)
Data leakage detection
Data leakage detection
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
164788616_Data_Leakage_Detection_Complete_Project_Report__1_.docx.pdf
Jpdcs1 data leakage detection
Jpdcs1 data leakage detection
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage Detection
Data leakage detection Complete Seminar
Data leakage detection Complete Seminar
Dn31538540
Dn31538540
Data leakage detection
Data leakage detection
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
Data Leakage Detection
Data Leakage Detection
Privacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage System
DLD_SYNOPSIS
DLD_SYNOPSIS
Data leakage detection
Data leakage detection
Data leakage detection
Data leakage detection
Data leakage detection
Data leakage detection
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
dataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptx
IRJET- Data Leakage Detection System
IRJET- Data Leakage Detection System
83504808-Data-Leakage-Detection-1-Final.ppt
83504808-Data-Leakage-Detection-1-Final.ppt
Data leakage detection
Data leakage detection
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakage
Más de Editor IJARCET
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Editor IJARCET
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Editor IJARCET
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Editor IJARCET
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Editor IJARCET
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Editor IJARCET
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Editor IJARCET
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Editor IJARCET
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Editor IJARCET
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Editor IJARCET
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Editor IJARCET
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Editor IJARCET
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Editor IJARCET
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Editor IJARCET
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Editor IJARCET
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Editor IJARCET
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Editor IJARCET
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Editor IJARCET
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
Editor IJARCET
Más de Editor IJARCET
(20)
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
Último
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
The Digital Insurer
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
Boston Institute of Analytics
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
hans926745
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Último
(20)
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
709 713
1.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 A Model for identifying Guilty Agents in Data Transmission Shreyta Raj , Dr. Ravinder Purwar , Ashutosh Dangwal Abstract-- This research paper presents a formal company may have partnerships with other method for representing and detecting inconsistencies of companies that require sharing customer data. combined secrecy models is to detect when the PC Another enterprise may outsource its data processing, distributor’s sensitive data has been leaked by their so data must be given to various other companies. agents, and if possible to identify the agent that leaked We call the owner of the data the distributor and the the data. Data leakage is a silent type of threat. This sensitive information can be electronically distributed supposedly trusted third parties the agents. Our goal via e-mail, Web sites, FTP, instant messaging, is to detect when the distributor’s sensitive data has spreadsheets, databases, and any other electronic means been leaked by agents, and if possible to identify the available – all without your knowledge. Data allocation agent that leaked the data. We consider applications strategies (across the agents) are proposed that improve where the original sensitive data cannot be perturbed. the probability of identifying leakages. These methods Perturbation is a very useful technique where the data do not rely on alterations of the released data (e.g., is modified and made “less sensitive” before being watermarks). In some cases the distributor can also handed to agents. For example, one can add random inject “realistic but fake” data records to further noise to certain attributes, or one can replace exact improve our chances of detecting leakage and identifying the guilty party. A model for assessing the values by ranges. However, in some cases it is “guilt” of agents using C# dot net technologies with MS important not to alter the original distributor’s data. sql server as backend is proposed to develop. For example, if an outsourcer is doing our payroll, he Algorithms for distributing objects to agents, in a way must have the exact salary and customer bank that improves our chances of identifying a leaker is account numbers. If medical researchers will be aloes presented. Finally, the option of adding “fake” treating patients (as opposed to simply computing objects to the distributed set is also considered. Such statistics), they may need accurate data for the objects do not correspond to real entities but appear. patients. Index Terms - Data Leakage, Data Privacy, Fake Traditionally, leakage detection is handled by Record,. watermarking, e.g., a unique code is embedded in I. INTRODUCTION each distributed copy. If that copy is later discovered in the hands of an unauthorized party, the leaker can While doing business, practical necessities may be identified. Watermarks can be very useful in some motivate the use of secrecy models in combination cases, but again, involve some modification of the and in addition other business policies may be original data. Furthermore, watermarks can necessary sometimes sensitive data must be handed sometimes be destroyed if the data recipient is over to supposedly trusted third parties. For example, malicious. a hospital may give patient records to researchers who will devise new treatments. Similarly, a 709 All Rights Reserved © 2012 IJARCET
2.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 In this work, unobtrusive techniques for detecting opposed to simply computing statistics), they may leakage of a set of objects or records have been need accurate data for the patients. studied. For example, after giving a set of objects to agents, the distributor discovers some of those same objects in an unauthorized place. At this point the B. Watermarking distributor can assess the likelihood that the leaked Traditionally, leakage detection is handled by data came from one or more agents, as opposed to watermarking, e.g., a unique code is embedded in having been independently gathered by other means. each distributed copy. If that copy is later discovered Using an analogy with cookies stolen from a cookie in the hands of an unauthorized party, the leaker can jar, if we catch Freddie with a single cookie, he can be identified. Watermarks can be very useful in some argue that a friend gave him the cookie. But if we cases, but again, involve some modification of the catch Freddie with 5 cookies, it will be much harder original data. Furthermore, watermarks can for him to argue that his hands were not in the cookie sometimes be destroyed if the data recipient is jar. If the distributor sees “enough evidence” that an malicious. agent leaked data, he may stop doing business with him, or may initiate legal proceedings. In this paper we develop a model for assessing the “guilt” of III. PROPOSED SYSTEM agents. We also present algorithms for distributing objects to agents, in a way that improves our chances Unobtrusive techniques for detecting leakage of a set of of identifying a leaker. Finally, we also consider the objects or records have been studied. After giving a set of option of adding “fake” objects to the distributed set. objects to agents, the distributor discovers some of those Such objects do not correspond to real entities but same objects in an unauthorized place. (For example, the appear realistic to the agents. In a sense, the fake data may be found on a web site, or may be obtained through a legal discovery process.) At this point the objects acts as a type of watermark for the entire set, distributor can assess the likelihood that the leaked data without modifying any individual members. If it came from one or more agents, as opposed to having been turns out an agent was given one or more fake objects independently gathered by other means. Using an analogy that were leaked, then the distributor can be more with cookies stolen from a cookie jar, if Freddie with a confident that agent was guilty. single cookie has been cached, he can argue that a friend gave him the cookie. But if Freddie with 5 cookies has been cached, it will be much harder for him to argue that his II. EXISTING SYSTEM hands were not in the cookie jar. If the distributor sees “enough evidence” that an agent leaked data, he may stop A. Perturbation doing business with him, or may initiate legal proceedings. Data perturbation refers to a data transformation process typically performed by the data owners A model for assessing the “guilt” of agents has been before publishing their data. The goal of performing developed. An algorithm for distributing objects to agents, such data transformation is two-fold. On one hand, in a way that improves our chances of identifying a leaker has been proposed. The option of adding “fake” objects to the data owners want to change the data in a certain the distributed set also been considered. Such objects do way in order to disguise the sensitive information not correspond to real entities but appear realistic to the contained in the published datasets, and on the other agents. In a sense, the fake objects acts as a type of hand, the data owners want the transformation to best watermark for the entire set, without modifying any preserve. For example, one can add random noise to individual members. If it turns out an agent was given one certain attributes, or one can replace exact values by or more fake objects that were leaked, then the distributor ranges. However, in some cases it is important not to can be more confident that agent was guilty. alter the original distributor’s data. For example, if an outsourcer is doing our payroll, he must have the exact salary and customer bank account numbers. If Advantages- medical researchers will be treating patients (as 710 All Rights Reserved © 2012 IJARCET
3.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 After giving a set of objects to agents, the number of guilt agents by the number of file transfers distributor discovers some of those same between the agent and unauthorized person. objects in an unauthorized place. A. MODULE DESCRIPTION At this point the distributor can assess the 1- Login / Registrations - This is a module likelihood that the leaked data came from mainly designed to provide the authority to a one or more agents, as opposed to having user in order to access the other modules of been independently gathered by other the project. means. 2- Data Transfer- This module is mainly designed to transfer data from distributor to If the distributor sees “enough evidence” agents. The same module can also be used that an agent leaked data, he may stop doing for illegal data transfer from authorized to business with him, or may initiate legal agents to other agents proceedings. 3- Guilt Model Analysis- This module is designed using the agent – guilt model. To develop a model for assessing the “guilt” Here a count value(also called as fake of agents. objects) are incremented for any transfer of data occurrence when agent transfers data. We also present algorithms for distributing Fake objects are stored in database. objects to agents, in a way that improves our 4- Agent Guilt Model- This module is mainly chances of identifying a leaker. designed for determining fake agents. This module uses fake objects (which is stored in Consider the option of adding “fake” objects database from guilt model module) and to the distributed set. Such objects do not determines the guilt agent along with the correspond to real entities but appear. probability. A graph is used to plot the probability distribution of data which is If it turns out an agent was given one or leaked by fake agents. more fake objects that were leaked, then the distributor can be more confident that agent To compute this probability, we need an estimate for was guilty. the probability that values can be “guessed” by the target. B. Algorithm Steps Step: 1 Distributor select agent to send data IV. IMPLEMENTATION PLAN The distributor selects two agents and gives In this application, we try to implement a model application requested data R1, R2 to both agents. to detect the data leakages between distributor and agents. The system is developed in C# dot net. We use Microsoft Step: 2 Distributor creates fake object and allocates it SQL Server 2000 as database for this application. When the to the agent distributor sends a file to agent, it is considered as fake object for that particular agent, in this sequence file name The distributor can create one fake object (B = 1) and and file path is stored in the database for future reference. both agents can receive one fake object (b1 = b2 = 1). If the distributor is able to create more fake objects, Similarly when the agent sends a file to the he could further improve the objective. unauthorized agent the sequence is store in the database. Thus we can find the guilt agent. The Step: 3 check number of agents, who have already probability function is calculated based on the received data 711 All Rights Reserved © 2012 IJARCET
4.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Distributor checks the number of agents, who VI. LITERATURE REVIEW have already received data. The guilt detection approach we present is related to Step: 4 Check for remaining agents the data provenance problem, tracing the lineage of S objects implies essentially the detection of the guilty Distributor chooses the remaining agents to send the agents. data. Distributor can increase the number of possible allocations by adding fake object. Suggested solutions are domain specific, Step: 5 Select fake object again to allocate for such as lineage tracing for data warehouses remaining agents and assume some prior knowledge on the way a data view is created out of data Distributor chooses the random fake object to sources. allocate for the remaining agents. Step: 6 Estimate the probability value for guilt agent Watermarks were initially used in images, To compute this probability, we need an estimate for video and audio data whose digital the probability that values can be “guessed” by the representation includes considerable target. redundancy. Watermarking is similar in the sense of providing agents with some kind of receiver-identifying information. However, V. WHY USE DATAMINING by its very nature, a watermark modifies the item being watermarked. If the object to be Data mining is the process of extracting patterns from watermarked cannot be modified then a data. Data mining is becoming an increasingly watermark cannot be inserted. In such cases important tool to transform the data into information. methods that attach watermarks to the It is commonly used in a wide range of profiling distributed data are not applicable. practices such as marketing, surveillance fraud detection and scientific discovery. Data mining can be used to uncover patterns in data but is often Recently, works have also studied marks carried out only on samples of data. The mining insertion to relational data. process will be ineffective if the samples are not a good representation of the larger body of data. Data mining cannot discover patterns that may be present There are also lots of other works on in the larger body of data if those patterns are not mechanisms that allow only authorized users present in the sample being "mined". Inability to find to access sensitive data through access patterns may become a cause for some disputes control policies. Such approaches prevent in between customers and service providers. Therefore some sense data leakage by sharing data mining is not foolproof but may be useful if information only with trusted parties. sufficiently representative data samples are collected. However, these policies are restrictive and The discovery of a particular pattern in a particular may make it impossible to satisfy agents’ set of data does not necessarily mean that a pattern is requests. found elsewhere in the larger data from which that sample was drawn. An important part of the process is the verification and validation of patterns on other samples of data 712 All Rights Reserved © 2012 IJARCET
5.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Algorithm Results to find out Guilty Agents REFERENCES [1] R. Agrawal and J. Kiernan. Watermarking relational databases. In VLDB ’02: Proceedings of the 28th international conference on Very Large Data Bases, pages 155–166. VLDB Endowment, 2002. [2] P. Bonatti, S. D. C. di Vimercati, and P. Samarati. An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur., 5(1):1–35, 2002. [3] P. Buneman, S. Khanna, and W. C. Tan. Why and where: A characterization of data provenance. In J. V. den Bussche and V. Vianu, editors, Database Theory - ICDT 2001, 8th International Conference, London, UK, January 4-6, 2001, Proceedings, volume 1973 of Lecture Notes in Computer Science, pages 316–330. Springer, Note: a002 is the guilty agent. 2001. [4] P. Buneman and W.-C. Tan. Provenance in databases. In SIGMOD ’07: Proceedings of the 2007 ACM SIGMOD international conference on Management of data, pages 1171– Probability distribution of Agent Data 1173, New York, NY, USA, 2007. ACM. [5] Y. Cui and J. Widom. Lineage tracing for general data warehouse transformations. In The VLDB Journal, pages 471–480, 2001. [6] V. N. Murty. Counting the integer solutions of a linear equation with unit coefficients. Mathematics Magazine, 54(2):79–81, 1981. [7] P. Papadimitriou and H. Garcia-Molina. Data leakage detection.Technical report, Stanford University, 2008. [8] J. J. K. O. Ruanaidh, W. J. Dowling, and F. M. Boland. Watermarking digital images for copyright protection. I.E.E. Proceedings on Vision, Signal and Image Processing, 143(4):250– 256, 1996. [9] R. Sion, M. Atallah, and S. Prabhakar. Rights protection for relational data. In SIGMOD ’03: Proceedings of the 2003 ACM SIGMOD international conference on Management of data, pages 98–109, New York, NY, USA, 2003. ACM. [10] L. Sweeney. Achieving k-anonymity privacy protection usinggeneralization and suppression, 2002. 7. CONCLUSION The likelihood that an agent is responsible for a leak is [11] S. U. Nabar, B. Marthi, K. Kenthapadi, N. Mishra, and R. assessed, based on the overlap of his data with the leaked Motwani. Towards robustness in query auditing. In VLDB ’06: Proceedings of the 32nd international conference on Very large data and the data of other agents, and based on the data bases, pages 151–162. VLDB Endowment, 2006. probability that objects can be “guessed” by other means. The algorithms we have presented implement a variety of [12] P. M. Pardalos and S. A. Vavasis. Quadratic programming data distribution strategies that can improve the with one negative eigenvalue is np-hard. Journal of Global distributor’s chances of identifying a leaker. We have Optimization, 1(1):15–22, 1991. shown that distributing objects judiciously can make a significant difference in identifying guilty agents, especially in cases where there is large overlap in the data that agents must receive. 713 All Rights Reserved © 2012 IJARCET
Descargar ahora