0% found this document useful (0 votes)
146 views

Data Leakage Detection System

This document summarizes a data leakage detection system presented by Team A9. It discusses how sensitive data distributed to third parties can be leaked, and the existing use of watermarking. The proposed system aims to detect leaks and identify the leaking agent through unobtrusive techniques, a guilt assessment model, and optimized data distribution strategies without altering the data. It provides hardware and software requirements and includes flow and block diagrams.

Uploaded by

Neeraj Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
146 views

Data Leakage Detection System

This document summarizes a data leakage detection system presented by Team A9. It discusses how sensitive data distributed to third parties can be leaked, and the existing use of watermarking. The proposed system aims to detect leaks and identify the leaking agent through unobtrusive techniques, a guilt assessment model, and optimized data distribution strategies without altering the data. It provides hardware and software requirements and includes flow and block diagrams.

Uploaded by

Neeraj Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

DATA LEAKAGE

DETCTION SYSTEM

Presented By Team A9:-


Anurag Thakur(20CSE036)
Neeraj Kumar(20CSE054)
Ananya Dash(20CSE063)

Class Teacher:- Mr.Anil Kumar Meher


Project co-ordinator:- Bhavani Shankar Panda
HOD:-Dr. Sanjay Kumar Kuanar
ABSTRACT:
• Data leakage is an uncontrolled or unauthorized transmission of
classified information to the outside.

•A data distributor has given sensitive data to a set of supposedly


trusted agents(third parties).

•It poses a serious problem to companies as the cost of incidents


continues to increase.

•The purpose of this project is to design and implement a data


leakage detection system based on special information retrieval
models and methods.
OBJECTIVES:
•A data distributor has given sensitive data to a set of supposedly trusted
agents(third parties).
•Some of the data is leaked and found in an unauthorized place.
•The distributor must assess the likelihood that the leaked data came from
one or more agents, as opposed to having been independently gathered by
other means.
•We propose data allocation strategies (across the agents) that improve the
probability of identifying leakages.
•These methods do not rely on alterations of the released data . In some
cases we can also inject “realistic but fake” data records to further improve
our chances of detecting leakage and identifying the guilty party.
•Our goal is to detect when the distributor’s sensitive data has been leaked
by agents, and if possible to identify the agent that leaked the data.
EXISTING SYSTEM:
Traditionally, leakage detection is handled by watermarking, e.g., a unique code
is embedded in each distributed copy.
If that copy is later discovered in the hands of an unauthorized party, the leaker
can be identified.
PROPOSED SYSTEM:
• Our goal is to detect when the distributor's sensitive data has been leaked
by agents, and identify the agent that leaked the data.

Watermarking is a very useful technique where the data is modified and


made "less sensitive" before being handed to agents.

We develop unobtrusive techniques for detecting leakage of a set of objects


or records.

We develop a model for assessing the "guilt" of agents.

We also present algorithms for distributing objects to agents, in a way that


improves our chances of identifying a leaker.
PROPOSED SYSTEM:
Software Requirements:
•Language : PHP
•IDE :VISUAL STUDIO
•Operating System :WINDOWS 10 & 11
•Technology :ASP.NET
•Backend :MY SQL
HARDWARE REQUIREMENTS:
•INTEL PROCESSOR
•RAM (512 MB)
•HARDDISK (40 GB)
•RGB KEYBOARD
•MONITOR
FLOW CHART:
BLOCK DIAGRAM:
HOME:

•This is the main page of our project.


•It contains all the options for next page.
UPLOAD ARTICLE:

Here, we can upload the article related to any field.


View file:
Registration :

You might also like