Vishal Patil Paresh Rawat Pratik Nikam Satish Patil By: Under The Guidance Of Prof.Rucha Samant.

Slides:



Advertisements
Similar presentations
The Transmission Control Protocol (TCP) carries most Internet traffic, so performance of the Internet depends to a great extent on how well TCP works.
Advertisements

CLOSENESS: A NEW PRIVACY MEASURE FOR DATA PUBLISHING
A DISTRIBUTED CSMA ALGORITHM FOR THROUGHPUT AND UTILITY MAXIMIZATION IN WIRELESS NETWORKS.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
WEB USAGE MINING FRAMEWORK FOR MINING EVOLVING USER PROFILES IN DYNAMIC WEBSITE DONE BY: AYESHA NUSRATH 07L51A0517 FIRDOUSE AFREEN 07L51A0522.
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Lecture 5 Memory Management Part I. Lecture Highlights  Introduction to Memory Management  What is memory management  Related Problems of Redundancy,
MEASUROUTING: A FRAMEWORK FOR ROUTING ASSISTED TRAFFIC MONITORING PRESENTED BY.
Detecting Data Leakage Panagiotis Papadimitriou Hector Garcia-Molina
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
S EMINAR A SELF DESTRUCTING DATA SYSTEM BASED ON ACTIVE STORAGE FRAMEWORK ONON P RESENTED BY S HANKAR G ADHVE G UIDED BY P ROF.P RAFUL P ARDHI.
Copyright © 2006 Exportech Portugal. All rights reserved.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Peer-to-peer archival data trading Brian Cooper Joint work with Hector Garcia-Molina (and others) Stanford University.
CS 589 Information Risk Management 23 January 2007.
Using Digital Credentials On The World-Wide Web M. Winslett.
Web Search – Summer Term 2006 IV. Web Search - Crawling (c) Wolfgang Hürst, Albert-Ludwigs-University.
1 Pertemuan 3 Information at Risk Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Enhancing Address Privacy on Anti-SPAM by Dou Wang and Ying Chen School of Computer Science University of Windsor October 2007.
1 Towards an end-to-end architecture for handling sensitive data Hector Garcia-Molina Rajeev Motwani and students.
David Overton Head of Small Business Technology – Head of Small Business Technology – Microsoft solutions for.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
Masud Hasan Secue VS Hushmail Project 2.
01-Feb-12Data Leakage Detection1. CONTENTS  ABSTRACT  INTRODUCTION  OBJECTIVES  STUDY AND ANALYSIS  FLOW CHART  FUTURE SCOPE  LIMITATIONS  APPLICATIONS.
Cross-Domain Privacy-Preserving Cooperative Firewall Optimization.
Layered Approach using Conditional Random Fields For Intrusion Detection.
Security Evaluation of Pattern Classifiers under Attack.
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
TRUST NEGOTIATION IN ONLINE BUSINESS TRANSACTIONS BY CHANDRAKANTH REDDY.
Data Leakage Detection by Akshay Vishwanathan ( ) Joseph George ( ) S. Prasanth ( ) Guided by: Ms. Krishnapriya.
Improving Network I/O Virtualization for Cloud Computing.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Department of Computer Science Southern Illinois University Edwardsville Spring, 2010 Dr. Hiroshi Fujinoki CS 547/490 Network.
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.
m-Privacy for Collaborative Data Publishing
Optimal Client-Server Assignment for Internet Distributed Systems.
ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA( ) 04/07/2013.
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices Igor Bilogrevic, Member, IEEE, Murtuza Jadliwala, Member, IEEE, Vishal Joneja,
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data.
Privacy Preservation of Aggregates in Hidden Databases: Why and How? Arjun Dasgupta, Nan Zhang, Gautam Das, Surajit Chaudhuri Presented by PENG Yu.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
Privacy Preserving Back- Propagation Neural Network Learning Made Practical with Cloud Computing.
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Under The Guidance of Smt. Ch.Ratna Kumari Asst.Professor Submitted by M Ravi Kumar Roll No:10021F0006 M.C.A.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
m-Privacy for Collaborative Data Publishing
Data Leakage Detection by R.Kartheek Reddy 09C31D5807 (M.Tech CSE)
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations.
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
Whole Test Suite Generation. Abstract Not all bugs lead to program crashes, and not always is there a formal specification to check the correctness of.
ONLINE INTRUSION ALERT AGGREGATION WITH GENERATIVE DATA STREAM MODELING.
Guided By: Prof. Rajarshree Karande JSPM’S IMPERIAL COLLEGE OF ENGINEERING & RESEARCH WAGHOLI, PUNE Group MemberRoll No. Abhijeet Aralgundkar03.
Prepared by K.Phani Kumar.  Introduction:  This project is aimed at developing a system by which the employees in the organization submit the bills.
ENERGY EFFICIENT TIME SYNCHRONIZATION PROTOCOL FOR MOBILE UNDERWATER ACOUSTIC SENSOR NETWORKS Under the Guidance of Submitted by Mr. P. Mukunthan, AP/CSE.
“Ensuring distributed accountability for data sharing in the cloud”
Data Leakage Detection Major Project Report Submitted by Ankit Kumar Tater:08J41A1206 Y. V. Pradeep Kumar Reddy:08J41A1235 Pradeep Saklani:08J41A1236 Under.
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
Speed Cash System. Purpose of the Project  online Banking Transaction Information.  keeping in view of the distributed client server computing technology,
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
PRESENTED BY. Keywords Firewall : Any barrier that is intended to thwart the spread of a destructive agent. Computer Definition : A system designed to.
Towards Scalable Traffic Management in Cloud Data Centers
Hacker Detection in Wireless sensor network
ROBUST FACE NAME GRAPH MATCHING FOR MOVIE CHARACTER IDENTIFICATION
STEGANOGRAPHY.
Department Of Computer Science Engineering
Optimize Your Java Code By Tools
Protecting Privacy During On-line Trust Negotiation
Presentation transcript:

Vishal Patil Paresh Rawat Pratik Nikam Satish Patil By: Under The Guidance Of Prof.Rucha Samant

Agenda  PROBLEM DEFINITION  INTRODUCTION  ISSUES  SCOPE  ANALYSIS  DESIGN  IMPLEMENTATIONS

Problem Definition  To detect whether data has been leaked by agents.  To prevent data leakage.

Introduction In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties. Our goal is to detect when the distributor's sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data.

Existing System

Proposed System  In this system the leakage of data is detected by generating fake objects.  Data leakage prevention and detection of guilty agents is handled by filtering.

Types of employees that put your company at risk  The security illiterate  The gadget nerds  The unlawful residents  The malicious/disgruntled employees

Problem Setup and Notation  Distributor (D) is a system which will distribute data to agents  Valuable Data (T) is the set of sensitive data which the system is going to send to the agents  Agent (U) is the set of agents to whom the system is going to send sensitive data.  Request from client will be either sample request or explicit request. Analysis

Explicit Data Requests 1. Distributor having data T={t1,t2} 2. Agent request (R ) R1= {t1, t2} R2= {t1} R1 gets both data t1 and t2 R2 gets data t1 Therefore value of sum objective. R1+ R2 2/2 + 1/2 = Select agent using Randomize function algorithm. SelectAgent {R1,…….,R2} 4. E-optimal solution O(n+n 2 B)= O(n 2 B) Where n= number of agents, B= number of Fake objects. In this algorithm, the agent receives the entire data object that satisfies the condition of the agents’ data request. The following algorithm shows the working of Explicit Data Request:

Sample Data Requests With sample data requests, agents are not interested in particular objects. In this algorithm, the agent receives only the subset of data object that can be given. The working of Sample Data Request algorithm is same as the working of Explicit Data Request.

ARCHITECTURE DIAGRAM: Data Distributor Agents Agents Requesting Secured data from the Data Distributor Requesting sensitive data

ARCHITECTURE DIAGRAM: Data distributor sending the secured data to the agents Sensitive data is sent Data Distributor Agents

Internet The Sent don’t contains fake Object/Watermarks. Forwarded to the outside world Agent tries to leak the sensitive data

The Sent contains fake Object/Watermarks. Internet Infected containing fake object Notification is sent Agent tries to leak the sensitive data

The system has the following Data Allocation -- approach same as watermarking -- less sensitive -- add fake object in some cases Fake Object -- Are real looking object -- Should not affect data -- Limit on fake object insertion( inbox) -- CREATEFAKEOBJECT (Ri, Fi, CONDi)

Optimization -- One constraint and one objective -- Maximize the probability difference Data Distributor Filtering

Algorithm: 1. Identify the data. 2. Remove spamming stopping words. 3. Remove or change the synonyms. 4. Calculate the priority of the word depending upon the sensitivity of the data. 5. Compare data with predefine company data sets. 6. Filter the data if it has company’s important data sets.

Attached data is not sensitive data sent successfully Attached data is a sensitive data not sent as the data it contains is sensitive Agent

O/S :Windows XP. Language:Asp.Net, c#. Data Base:Sql Server 2005 System:Pentium IV 2.4 GHz Hard Disk : 40 GB Monitor: 15 VGA colour Mouse: Logitech. Keyboard: 110 keys enhanced. RAM: 256 MB

 In the real scenario there is no need to hand over the sensitive data to the agents who will unknowingly or maliciously leak it.  However, in many cases, we must indeed work with agents that may not be 100 percent trusted, and we may not be certain if a leaked object came from an agent or from some other source.  In spite of these difficulties, it is possible to assess the likelihood that an agent is responsible for a leak, based on the overlap of his data with the leaked data.  The algorithms we have presented implement a variety of data distribution strategies that can improve the distributor’s chances of identifying a leaker.

 R. Agrawal and J. Kiernan, “Watermarking Relational Databases,”Proc. 28th Int’l Conf. Very Large Data Bases (VLDB ’02), VLDB.Endowment, pp ,  S. Czerwinski, R. Fromm, and T. Hodes, “Digital Music Distribution and Audio Watermarking,” org/ ,  F. Guo, J. Wang, Z. Zhang, X. Ye, and D. Li, “An Improved Algorithm to Watermark Numeric Relational Data,” Information Security Applications, pp , Springer,  S. Jajodia, P. Samarati, M.L. Sapino, and V.S. Subrahmanian, “Flexible Support for Multiple Access Control Policies,” ACM Trans. Database Systems, vol. 26, no. 2, pp ,  Panagiotis Papadimitriou and Hector Garcia-Molina, “Data Leakage Detection,” IEEE Transactions on Knowledge and Data Engineering, Vol 23, No.1 January  B. Mungamuru and H. Garcia-Molina, “Privacy, Preservation and Performance: The 3 P’s of Distributed Data Management,” technical report, Stanford Univ., 2008.