Data Leakage Detection by R.Kartheek Reddy 09C31D5807 (M.Tech CSE)

Slides:



Advertisements
Similar presentations
Study On Intelligent E-Shopping System Based On Data Mining
Advertisements

WEB USAGE MINING FRAMEWORK FOR MINING EVOLVING USER PROFILES IN DYNAMIC WEBSITE DONE BY: AYESHA NUSRATH 07L51A0517 FIRDOUSE AFREEN 07L51A0522.
Detecting Data Leakage Panagiotis Papadimitriou Hector Garcia-Molina
Vishal Patil Paresh Rawat Pratik Nikam Satish Patil By: Under The Guidance Of Prof.Rucha Samant.
Cyber X-Force-SMS alert system for threats.
HENGHA: DATA HARVESTING DETECTION ON HIDDEN DATABASES Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi University of California, Santa Barbara CCSW 2010.
Data mining By Aung Oo.
Toward a Statistical Framework for Source Anonymity in Sensor Networks.
Annotating Search Results from Web Databases. Abstract An increasing number of databases have become web accessible through HTML form-based search interfaces.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Report : Zhen Ming Wu 2008 IEEE 9th Grid Computing Conference.
Abstract Provable data possession (PDP) is a probabilistic proof technique for cloud service providers (CSPs) to prove the clients' data integrity without.
Review of Building Intelligent.NET Applications Stu Egli Andre Inistotov Frenny Saldana Kate Styers Nishant Zinzuwadia MSE 614 February 26, 2008.
Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs.
1 Data Mining Books: 1.Data Mining, 1996 Pieter Adriaans and Dolf Zantinge Addison-Wesley 2.Discovering Data Mining, 1997 From Concept to Implementation.
01-Feb-12Data Leakage Detection1. CONTENTS  ABSTRACT  INTRODUCTION  OBJECTIVES  STUDY AND ANALYSIS  FLOW CHART  FUTURE SCOPE  LIMITATIONS  APPLICATIONS.
Cross-Domain Privacy-Preserving Cooperative Firewall Optimization.
Page 1 WEB MINING by NINI P SURESH PROJECT CO-ORDINATOR Kavitha Murugeshan.
Security Evaluation of Pattern Classifiers under Attack.
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data.
Abstract Many security primitives are based on hard math¬ematical problems. Using hard AI problems for security is emerging as an exciting new paradigm,
Group Members: Group Members:.  Introduction  Current Scenario  Proposed Solution  Block Diagram  Technical Implementation  Hardware & Software.
Data Leakage Detection by Akshay Vishwanathan ( ) Joseph George ( ) S. Prasanth ( ) Guided by: Ms. Krishnapriya.
1 1 Slide Introduction to Data Mining and Business Intelligence.
Team Members ? ? Chintan Goswami Nirav Tank Project Guide ? ? Mrs. Darshana H. Patel [Internal] Mr. Manish I. Vora [External]
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
Privacy Preserving Data Sharing With Anonymous ID Assignment
m-Privacy for Collaborative Data Publishing
Protecting Sensitive Labels in Social Network Data Anonymization.
Identity-Based Secure Distributed Data Storage Schemes.
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.
Project Plan for nSite Central Michael Dunn Ryan Sessions Kyle Kerrigan.
Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage.
Data Mining By Dave Maung.
Content Sharing over Smartphone-Based Delay- Tolerant Networks.
A System for Denial-of- Service Attack Detection Based on Multivariate Correlation Analysis.
Securing Class Initialization in Java-like Languages.
Privacy Preserving Delegated Access Control in Public Clouds.
Anomaly Detection via Online Over-Sampling Principal Component Analysis.
A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs.
KFC VIETNAM ORDER SYSTEM HTC TEAM. AGENDA 1.TEAM INTRODUCTION 2.PROJECT OVERVIEW 3.PLAN 4.PRODUCT ARCHITECTURE 5.DATABASE DESIGN 6.TEST PLAN & TEST REPORT.
Keyword Query Routing.
Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
Abstract With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial.
Facilitating Document Annotation using Content and Querying Value.
Privacy Preserving Back- Propagation Neural Network Learning Made Practical with Cloud Computing.
Preventing Private Information Inference Attacks on Social Networks.
Web Information Retrieval Prof. Alessandro Agostini 1 Context in Web Search Steve Lawrence Speaker: Antonella Delmestri IEEE Data Engineering Bulletin.
m-Privacy for Collaborative Data Publishing
Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations.
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
Privacy-Preserving and Content-Protecting Location Based Queries.
Whole Test Suite Generation. Abstract Not all bugs lead to program crashes, and not always is there a formal specification to check the correctness of.
ONLINE INTRUSION ALERT AGGREGATION WITH GENERATIVE DATA STREAM MODELING.
Facilitating Document Annotation Using Content and Querying Value.
Guided By: Prof. Rajarshree Karande JSPM’S IMPERIAL COLLEGE OF ENGINEERING & RESEARCH WAGHOLI, PUNE Group MemberRoll No. Abhijeet Aralgundkar03.
Prepared by K.Phani Kumar.  Introduction:  This project is aimed at developing a system by which the employees in the organization submit the bills.
APARTMENT MAINTENANCE SYSTEM M.Tech( Ph.D) HOD of C.S.E & I.T Dept.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
UNIVERSITY MANAGEMENT SYSTEM
A PROJECT ON TECH-FEST MANAGEMENT SYSTEM
Data Leakage Detection Major Project Report Submitted by Ankit Kumar Tater:08J41A1206 Y. V. Pradeep Kumar Reddy:08J41A1235 Pradeep Saklani:08J41A1236 Under.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
 Abstract  Introduction  Literature Survey  Conclusion on Literature Survey  Threat model and system architecture  Proposed Work  Attack Scenarios.
ROBUST FACE NAME GRAPH MATCHING FOR MOVIE CHARACTER IDENTIFICATION
Department Of Computer Science Engineering
Practice Management & Patient Health Record sharing system
Presentation transcript:

Data Leakage Detection by R.Kartheek Reddy 09C31D5807 (M.Tech CSE)

Knowledge And Data Engineering  Data Leakage Detection appears on KNOWLEDGE AND DATA ENGINEERING, VOL. 22, NO. 3, MARCH 2010  Author : Panagiotis Papadimitriou, Member, IEEE, Hector Garcia-Molina, Member, IEEE

Focused Areas in Knowledge & Data Engineering  Data Mining -- Knowledge Discovery in Databases (KDD) -- Intelligent Data Analysis  Database Systems -- Data Management -- Data Engineering  Knowledge Engineering -- Semantic Web -- Knowledge-Based Systems -- Soft Computing

What is Data Mining?  Many Definitions Non-trivial extraction of implicit, previously unknown and potentially useful information from data Exploration & analysis, by automatic or semi-automatic means, of large quantities of data in order to discover Meaningful patterns

Data Leakage Detection-Introduction  In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties. For example, a hospital may give patient records to researchers who will devise new treatments. We call the owner of the data the distributor and the supposedly trusted third parties the agents.  Our goal is to detect when the distributor’s sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data.

Problem Setup And Notation  Entities and Agents: A distributor owns a set T = {t1,..., tm} of valuable data objects. The distributor wants to share some of the objects with a set of agents U1, U2,...,Un, but does not wish the objects be leaked to other third parties.  An agent Ui receives a subset of objects Ri ⊆ T, determined either by a sample request or an explicit request.

Problem Setup And Notation  Guilty Agents: Suppose that after giving objects to agents, the distributor discovers that a set S ⊆ T has leaked. This means that some third party called the target, has been caught in possession of S. For example, this target may be displaying S on its web site, or perhaps as part of a legal discovery process, the target turned over S to the distributor.

Related Work  As far as the data allocation strategies are concerned, our work is mostly relevant to watermarking that is used as a means of establishing original ownership of distributed objects.

Related Work-Creating a Watermark

Related Work-Verifying a Watermark

Related Work  The main idea is to generate a watermark W(x; y) using a secret key chosen by the sender such that W(x; y) is indistinguishable from random noise for any entity that does not know the key (i.e., the recipients). The sender adds the watermark W(x; y) to the information object (image) I(x; y) before sharing it with the recipient(s). It is then hard for any recipient to guess the watermark W(x; y) (and subtract it from the transformed image I0(x; y)); the sender on the other hand can easily extract and verify a watermark (because it knows the key).

Agent Guilt Model  To compute this Pr{Gi|S}, we need an estimate for the probability that values in S can be “guessed” by the target.  Assumption 1. For all t, t 1 ∈ S such that t = t1 provenance of t is independent of the provenance of t1.  Assumption 2. An object t ∈ S can only be obtained by the target in one of two ways: A single agent Ui leaked t from its own Ri set; or The target guessed (or obtained through other means) t without the help of any of the n agents.

Data Allocation Problem  The main focus of the paper is the data allocation problem: how can the distributor “intelligently” give data to agents in order to improve the chances of detecting a guilty agent?  The two types of requests we handle are sample and explicit. Fake objects are objects generated by the distributor that are not in set T. The objects are designed to look like real objects, and are distributed to agents together with the T objects, in order to increase the chances of detecting agents that leak data.

Existing System  The Existing System can detect the hackers but the total no of cookies (evidence) will be less and the organization may not be able to proceed legally for further proceedings due to lack of good amount of cookies and the chances to escape of hackers are high.

Proposed System  In the Proposed System the hackers can be traced with good amount of evidence. In this proposed system the leakage of data is detected by the following methods viz.., generating Fake objects, Watermarking and by Encrypting the data.

Software Requirements Language : C#.NET Technology : ASP.NET IDE : Visual Studio 2008 Operating System : Microsoft Windows XP SP2 Backend : Microsoft SQL Server 2005

Hardware Requirements Processor: Intel Pentium or more RAM: 512 MB (Minimum) Hard Disk : 40 GB

Conclusion  In a perfect world there would be no need to hand over sensitive data to agents that may unknowingly or maliciously leak it. And even if we had to hand over sensitive data, in a perfect world we could watermark each object so that we could trace its origins with absolute certainty.

References  R. Agrawal and J. Kiernan. Watermarking relational databases. In VLDB ’02: Proceedings of the 28th international conference on Very Large Data Bases, pages 155–166. VLDB Endowment,  P. Bonatti, S. D. C. di Vimercati, and P. Samarati. An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur., 5(1):1–35,  P. Buneman, S. Khanna, and W. C. Tan. Why and where: Acharacterization of data provenance. In J. V. den Bussche andV. Vianu, editors, Database Theory - ICDT 2001, 8th International Conference, London, UK, January 4-6, 2001, Proceedings, volume 1973.

Thank You