This document summarizes a data leakage detection system presented by Team A9. It discusses how sensitive data distributed to third parties can be leaked, and the existing use of watermarking. The proposed system aims to detect leaks and identify the leaking agent through unobtrusive techniques, a guilt assessment model, and optimized data distribution strategies without altering the data. It provides hardware and software requirements and includes flow and block diagrams.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
146 views
Data Leakage Detection System
This document summarizes a data leakage detection system presented by Team A9. It discusses how sensitive data distributed to third parties can be leaked, and the existing use of watermarking. The proposed system aims to detect leaks and identify the leaking agent through unobtrusive techniques, a guilt assessment model, and optimized data distribution strategies without altering the data. It provides hardware and software requirements and includes flow and block diagrams.
Project co-ordinator:- Bhavani Shankar Panda HOD:-Dr. Sanjay Kumar Kuanar ABSTRACT: • Data leakage is an uncontrolled or unauthorized transmission of classified information to the outside.
•A data distributor has given sensitive data to a set of supposedly
trusted agents(third parties).
•It poses a serious problem to companies as the cost of incidents
continues to increase.
•The purpose of this project is to design and implement a data
leakage detection system based on special information retrieval models and methods. OBJECTIVES: •A data distributor has given sensitive data to a set of supposedly trusted agents(third parties). •Some of the data is leaked and found in an unauthorized place. •The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. •We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. •These methods do not rely on alterations of the released data . In some cases we can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party. •Our goal is to detect when the distributor’s sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data. EXISTING SYSTEM: Traditionally, leakage detection is handled by watermarking, e.g., a unique code is embedded in each distributed copy. If that copy is later discovered in the hands of an unauthorized party, the leaker can be identified. PROPOSED SYSTEM: • Our goal is to detect when the distributor's sensitive data has been leaked by agents, and identify the agent that leaked the data.
Watermarking is a very useful technique where the data is modified and
made "less sensitive" before being handed to agents.
We develop unobtrusive techniques for detecting leakage of a set of objects
or records.
We develop a model for assessing the "guilt" of agents.
We also present algorithms for distributing objects to agents, in a way that