SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
DATA LEAKAGE DETECTION
[DLD]
BY:[BE COMP]
Kaustubh R. Bojewar (B8544228)
Ronak R. Makadiya (B8544232)
Pranita S. Salla (B8544249)
Prajesh P. Shah (B8544253)
Under the guidance of
Ms. Roshani Ade
G.H RAISONI COLLEGE OF ENGINEERING AND TECHNOLOGY
1
AGENDA
 PROBLEM DEFINITION
 PROBLEM SETUPAND MATHEMATICAL
NOTATION
 SYSTEM ARCHITECTURE DESIGN
 SOFTWARE AND HARDWARE REQUIREMENT
 SCREEN SHOTS
 UML DIAGRAMS
 ADVANTAGES
 FUTURE SCOPES
 CONCLUSION
 REFERENCES
2
DATA LEAKAGE DETECTION
PROBLEM DEFINITION
 In the course of doing business, sometimes sensitive
data must be handed over to supposedly trusted third
parties.
 Our goal is to detect when the distributor's sensitive
data has been leaked by agents, through probability
calculation using number of download for a particular
agent.
3
DATA LEAKAGE DETECTION
PROBLEM SETUPAND NOTATION
Mathematical model
Title:-
DATA LEAKAGE DETECTION.
Problem statement: -
To build a application that helps in Detecting the data which
has been leaked. Also it helps in finding Guilty Agent
from the given set of agents which has leaked the data using
Probability Distribution through number of Downloads.
4
DATA LEAKAGE DETECTION
Problem description:
Let,
DLD is the system such that DLD={A,D,T,U,R,S,U*,C,M,F}.
1.{A} is the Administrator who controls entire operation’s
performed in the Software
2.{D} is the Distributor who will send data T to different agents U.
3. T is the set of data object that are supplied to agents.
T can be of any type and size, e.g., they could be tuples in a
relation, or relations in a database.
T= {t1,t2,t3,...tn}
4. U is the set of Agents who will receive the data from the
distributor A
U={u1,u2,u3,...un}
5. R is the record set of Data objects which is sent to agents
R={t1,t3,t5..tm} R is a Subset of T
5
DATA LEAKAGE DETECTION
6. S is the record set of data objects which are leaked.
S={t1,t3,t5..tm} S is a Subset of T
7. U* is the set of all agents which may have leaked the data
U*={u1,u3,...um} U* is a subset of U
8. C is the set of conditions which will be given by the
agents to the distributor.
C={cond1,cond2,cond3,...,condn}
9. M is set of data objects to be send in Sample Data
Request algorithm
M={m1,m2,m3,...,mn}
6
DATA LEAKAGE DETECTION
ACTIVITY:
SAMPLE is a function for a data allocation for any mi subset of records from
T. The transition can be shown as:
Ri =SAMPLE(T, mi)
EXPLICIT is a function for a data allocation for which satisfies the condition.
Ri =EXPLICIT(T,condi)
SELECTAGENT is the function used in EXPLICIT algorithm for finding the
agent .
SELECTAGENT(R1,R2….Rn)
SELECTOBJECT is the function used in SAMPLE algorithm for selecting the
data Objects
SELECTOBJECT(i,Ri)
SIMPLE ENCRYPTO is the function used to ENCRYPT the file to be sent to the
Agent
7
DATA LEAKAGE DETECTION
DATA STRUCTURES USED:
Array: To store the no of data objects T ,No of agents U , record
set R and to display the particular output.
Execution of functions :
The functions will be executed on a daily basis for number of
times whenever distributor wants to send the data to the agent
and vice versa using C and M.
8
DATA LEAKAGE DETECTION
FUNCTIONAL DEPENDENCY DIAGRAM:
The functional dependency of the system depends upon the
conditions which are given by the agent and no of records which
distributor decides to send to the agents.
Conditions
[C]
No. Of
Records
[M]
Record Set R
which is required
by the Distributor
Agents
[U]
Distributor
[A]
9
DATA LEAKAGE DETECTION
SYSTEM ARCHITECTURE DIAGRAM
10
DATA LEAKAGE DETECTION
SOFTWARE AND HARDWARE
REQUIREMENT
Hardware Interfaces
 2.4 GHZ, 80 GB HDD for installation.
 512 MB memory.
 Users can use any PC based browser clients with IE 5.5
upwards.
Software Interfaces
 JDK 1.6
 Java Swing
 Net beans 6.5
 Socket programming
 Triple AES algorithm
DATA LEAKAGE DETECTION 11
SCREEN SHOTS
DATA LEAKAGE DETECTION 12
1.User Login
DATA LEAKAGE DETECTION 13
2. Agent Form(Request)
DATA LEAKAGE DETECTION 14
3. Agent Form(Download Form)
DATA LEAKAGE DETECTION 15
4.Distributor(View shared files)
DATA LEAKAGE DETECTION 16
5.Distributor(Upload Files)
DATA LEAKAGE DETECTION 17
6. Administrator ( Probability Calc)
18
7. Administrator (Manage Agents)
DATA LEAKAGE DETECTION 19
UML DIAGRAMS
• Data Flow Diagram
• Use Case Diagram
• Class Diagram
• Sequence Diagram
• Activity Diagram
20
DATA LEAKAGE DETECTION
1. Data Flow Diagram
Level 0
21
DATA LEAKAGE DETECTION
Level 1
Level 2
23
DATA LEAKAGE DETECTION
Agent 2 Login View Data
Send Data To
Anonymous
User
Agent n Login View Data
Agent 1 Login View Data
.
.
.
Administrator
Email
Notification
2. Use Case Diagram
24
3.Class Diagram
DATA LEAKAGE DETECTION 25
4.Sequence Diagram
26
DATA LEAKAGE DETECTION
5. Activity Diagram
DATA LEAKAGE DETECTION 27
ADVANTAGES
 This system includes the data hiding along with the
provisional software with which only the data can
be accessed.
 This system gives privileged access to the
administrator (data distributor) as well as the
agents registered by the distributors. Only registered
agents can access the system. The user accounts can
be activated as well as cancelled.
 The exported file will be accessed only by the
system. The agent has given only the permission to
access the software and view the data. If the data is
leaked by the agent’ system the path and agent
information will be sent to the distributor thereby
the identity of the leaked user can be traced.
DATA LEAKAGE DETECTION 28
FUTURE SCOPE
DATA LEAKAGE DETECTION 29
 Currently, we are dealing with only text files in this
project but in future we will try to deal with all types of
files.
 Recent research papers say that it is not possible to find
the exact guilty agent who has leaked the data. Instead,
we are finding out the probability of the agent being
guilty or who has leaked the data through calculation of
number of downloads.
 For more security, we will also provide a verification
code on the agent’s mobile in future.
CONCLUSION
DATA LEAKAGE DETECTION
30
Login-
Registration
Module
Upload file using
secret key
File sharing with
agents
Start HTTP
server
Check guilty
agent
Receives request
for download
Decrypts using
secret key
Java security
framework
Socket
programming
HTTP server
Java swing API
Technology
Agent’s module
Distributor’s module
Data Leakage
Detection System
REFERENCES
 “Data Leakage Detection”Panagiotis Papadimitriou, Student
Member, IEEE, and Hector Garcia-Molina, Member, IEEE
 R. Agrawal and J. Kiernan, “Watermarking Relational
Databases,” Proc. 28th Int’l Conf. Very Large Data Bases
(VLDB ’02), VLDB Endowment, pp. 155-166, 2002.
 P. Bonatti, S.D.C. di Vimercati, and P. Samarati, “An Algebra
for Composing Access Control Policies,” ACM Trans.
Information and System Security, vol. 5, no. 1, pp. 1-35,
2002.
 P. Buneman, S. Khanna, and W.C. Tan, “Why and Where: A
Characterization of Data Provenance,” Proc. Eighth Int’l
Conf. Database Theory (ICDT ’01), J.V. den Bussche and V.
Vianu, eds., pp. 316-330, Jan. 2001
 P. Buneman and W.-C. Tan, “Provenance in Databases,”
Proc. ACM SIGMOD, pp. 1171-1173, 2007.
31
DATA LEAKAGE DETECTION
 Y. Cui and J. Widom, “Lineage Tracing for General Data
Warehouse Transformations,” The VLDB J., vol. 12, pp. 41-
58, 2003.
 F. Hartung and B. Girod, “Watermarking of Uncompressed
and Compressed Video,” Signal Processing, vol. 66, no. 3, pp.
283-301,
 1998.
 S. Jajodia, P. Samarati, M.L. Sapino, and V.S.
Subrahmanian,“Flexible Support for Multiple Access Control
Policies,” ACM
 Trans. Database Systems, vol. 26, no. 2, pp. 214-260, 2001.
 Y. Li, V. Swarup, and S. Jajodia, “Fingerprinting
RelationalDatabases: Schemes and Specialties,” IEEE Trans.
Dependable and
 Secure Computing, vol. 2, no. 1, pp. 34-45, Jan.-Mar. 2005.
 B. Mungamuru and H. Garcia-Molina, “Privacy, Preservation
and Performance: The 3 P’s of Distributed Data
Management,” technical report, Stanford Univ., 2008.
DATA LEAKAGE DETECTION 32
THANKYOU...
33
DATA LEAKAGE DETECTION

Contenu connexe

Similaire à Presentation.pdf

Analytics of Performance and Data Quality for Mobile Edge Cloud Applications
Analytics of Performance and Data Quality for Mobile Edge Cloud ApplicationsAnalytics of Performance and Data Quality for Mobile Edge Cloud Applications
Analytics of Performance and Data Quality for Mobile Edge Cloud ApplicationsHong-Linh Truong
 
Designing and Implementing Effective Logging Strategies
Designing and Implementing Effective Logging StrategiesDesigning and Implementing Effective Logging Strategies
Designing and Implementing Effective Logging StrategiesAndreaCapolei1
 
Implementing a data_science_project (Python Version)_part1
Implementing a data_science_project (Python Version)_part1Implementing a data_science_project (Python Version)_part1
Implementing a data_science_project (Python Version)_part1Dr Sulaimon Afolabi
 
IRJET- Secure Skyline Queries over the Encrypted Data
IRJET- Secure Skyline Queries over the Encrypted DataIRJET- Secure Skyline Queries over the Encrypted Data
IRJET- Secure Skyline Queries over the Encrypted DataIRJET Journal
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET Journal
 
Passport Automation System
Passport Automation SystemPassport Automation System
Passport Automation SystemMegha Sahu
 
What does an event mean? Manage the meaning of your data! | Andreas Wombacher...
What does an event mean? Manage the meaning of your data! | Andreas Wombacher...What does an event mean? Manage the meaning of your data! | Andreas Wombacher...
What does an event mean? Manage the meaning of your data! | Andreas Wombacher...HostedbyConfluent
 
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based EncryptionIRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based EncryptionIRJET Journal
 
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATAANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATAIJCSEIT Journal
 
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery ToolsAntonio Rolle
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdfkristinatemen
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system pptashutosh rai
 
Internet of Things Microservices
Internet of Things MicroservicesInternet of Things Microservices
Internet of Things MicroservicesCapgemini
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET Journal
 
MA Microservices Meetup: Move fast and make things
MA Microservices Meetup: Move fast and make thingsMA Microservices Meetup: Move fast and make things
MA Microservices Meetup: Move fast and make thingsAmbassador Labs
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...IRJET Journal
 

Similaire à Presentation.pdf (20)

Analytics of Performance and Data Quality for Mobile Edge Cloud Applications
Analytics of Performance and Data Quality for Mobile Edge Cloud ApplicationsAnalytics of Performance and Data Quality for Mobile Edge Cloud Applications
Analytics of Performance and Data Quality for Mobile Edge Cloud Applications
 
Designing and Implementing Effective Logging Strategies
Designing and Implementing Effective Logging StrategiesDesigning and Implementing Effective Logging Strategies
Designing and Implementing Effective Logging Strategies
 
Implementing a data_science_project (Python Version)_part1
Implementing a data_science_project (Python Version)_part1Implementing a data_science_project (Python Version)_part1
Implementing a data_science_project (Python Version)_part1
 
IRJET- Secure Skyline Queries over the Encrypted Data
IRJET- Secure Skyline Queries over the Encrypted DataIRJET- Secure Skyline Queries over the Encrypted Data
IRJET- Secure Skyline Queries over the Encrypted Data
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
 
Passport Automation System
Passport Automation SystemPassport Automation System
Passport Automation System
 
Ws For Aq
Ws For AqWs For Aq
Ws For Aq
 
What does an event mean? Manage the meaning of your data! | Andreas Wombacher...
What does an event mean? Manage the meaning of your data! | Andreas Wombacher...What does an event mean? Manage the meaning of your data! | Andreas Wombacher...
What does an event mean? Manage the meaning of your data! | Andreas Wombacher...
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based EncryptionIRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
 
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATAANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA
ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA
 
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
 
[IJET-V1I3P3]
[IJET-V1I3P3][IJET-V1I3P3]
[IJET-V1I3P3]
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 
Internet of Things Microservices
Internet of Things MicroservicesInternet of Things Microservices
Internet of Things Microservices
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
 
MA Microservices Meetup: Move fast and make things
MA Microservices Meetup: Move fast and make thingsMA Microservices Meetup: Move fast and make things
MA Microservices Meetup: Move fast and make things
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
 

Plus de SPAMVEDANT

EJ NOV-18 (Sol) (E-next.in).pdf
EJ NOV-18 (Sol) (E-next.in).pdfEJ NOV-18 (Sol) (E-next.in).pdf
EJ NOV-18 (Sol) (E-next.in).pdfSPAMVEDANT
 
certificate format.docx
certificate format.docxcertificate format.docx
certificate format.docxSPAMVEDANT
 
Animal Welfare.pptx
Animal Welfare.pptxAnimal Welfare.pptx
Animal Welfare.pptxSPAMVEDANT
 

Plus de SPAMVEDANT (6)

PPT 1.pptx
PPT 1.pptxPPT 1.pptx
PPT 1.pptx
 
JSTL.pptx
JSTL.pptxJSTL.pptx
JSTL.pptx
 
EJ NOV-18 (Sol) (E-next.in).pdf
EJ NOV-18 (Sol) (E-next.in).pdfEJ NOV-18 (Sol) (E-next.in).pdf
EJ NOV-18 (Sol) (E-next.in).pdf
 
certificate format.docx
certificate format.docxcertificate format.docx
certificate format.docx
 
Animal Welfare.pptx
Animal Welfare.pptxAnimal Welfare.pptx
Animal Welfare.pptx
 
PPT 1.pptx
PPT 1.pptxPPT 1.pptx
PPT 1.pptx
 

Dernier

Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 

Dernier (20)

Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 

Presentation.pdf

  • 1. DATA LEAKAGE DETECTION [DLD] BY:[BE COMP] Kaustubh R. Bojewar (B8544228) Ronak R. Makadiya (B8544232) Pranita S. Salla (B8544249) Prajesh P. Shah (B8544253) Under the guidance of Ms. Roshani Ade G.H RAISONI COLLEGE OF ENGINEERING AND TECHNOLOGY 1
  • 2. AGENDA  PROBLEM DEFINITION  PROBLEM SETUPAND MATHEMATICAL NOTATION  SYSTEM ARCHITECTURE DESIGN  SOFTWARE AND HARDWARE REQUIREMENT  SCREEN SHOTS  UML DIAGRAMS  ADVANTAGES  FUTURE SCOPES  CONCLUSION  REFERENCES 2 DATA LEAKAGE DETECTION
  • 3. PROBLEM DEFINITION  In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties.  Our goal is to detect when the distributor's sensitive data has been leaked by agents, through probability calculation using number of download for a particular agent. 3 DATA LEAKAGE DETECTION
  • 4. PROBLEM SETUPAND NOTATION Mathematical model Title:- DATA LEAKAGE DETECTION. Problem statement: - To build a application that helps in Detecting the data which has been leaked. Also it helps in finding Guilty Agent from the given set of agents which has leaked the data using Probability Distribution through number of Downloads. 4 DATA LEAKAGE DETECTION
  • 5. Problem description: Let, DLD is the system such that DLD={A,D,T,U,R,S,U*,C,M,F}. 1.{A} is the Administrator who controls entire operation’s performed in the Software 2.{D} is the Distributor who will send data T to different agents U. 3. T is the set of data object that are supplied to agents. T can be of any type and size, e.g., they could be tuples in a relation, or relations in a database. T= {t1,t2,t3,...tn} 4. U is the set of Agents who will receive the data from the distributor A U={u1,u2,u3,...un} 5. R is the record set of Data objects which is sent to agents R={t1,t3,t5..tm} R is a Subset of T 5 DATA LEAKAGE DETECTION
  • 6. 6. S is the record set of data objects which are leaked. S={t1,t3,t5..tm} S is a Subset of T 7. U* is the set of all agents which may have leaked the data U*={u1,u3,...um} U* is a subset of U 8. C is the set of conditions which will be given by the agents to the distributor. C={cond1,cond2,cond3,...,condn} 9. M is set of data objects to be send in Sample Data Request algorithm M={m1,m2,m3,...,mn} 6 DATA LEAKAGE DETECTION
  • 7. ACTIVITY: SAMPLE is a function for a data allocation for any mi subset of records from T. The transition can be shown as: Ri =SAMPLE(T, mi) EXPLICIT is a function for a data allocation for which satisfies the condition. Ri =EXPLICIT(T,condi) SELECTAGENT is the function used in EXPLICIT algorithm for finding the agent . SELECTAGENT(R1,R2….Rn) SELECTOBJECT is the function used in SAMPLE algorithm for selecting the data Objects SELECTOBJECT(i,Ri) SIMPLE ENCRYPTO is the function used to ENCRYPT the file to be sent to the Agent 7 DATA LEAKAGE DETECTION
  • 8. DATA STRUCTURES USED: Array: To store the no of data objects T ,No of agents U , record set R and to display the particular output. Execution of functions : The functions will be executed on a daily basis for number of times whenever distributor wants to send the data to the agent and vice versa using C and M. 8 DATA LEAKAGE DETECTION
  • 9. FUNCTIONAL DEPENDENCY DIAGRAM: The functional dependency of the system depends upon the conditions which are given by the agent and no of records which distributor decides to send to the agents. Conditions [C] No. Of Records [M] Record Set R which is required by the Distributor Agents [U] Distributor [A] 9 DATA LEAKAGE DETECTION
  • 11. SOFTWARE AND HARDWARE REQUIREMENT Hardware Interfaces  2.4 GHZ, 80 GB HDD for installation.  512 MB memory.  Users can use any PC based browser clients with IE 5.5 upwards. Software Interfaces  JDK 1.6  Java Swing  Net beans 6.5  Socket programming  Triple AES algorithm DATA LEAKAGE DETECTION 11
  • 14. 2. Agent Form(Request) DATA LEAKAGE DETECTION 14
  • 15. 3. Agent Form(Download Form) DATA LEAKAGE DETECTION 15
  • 18. 6. Administrator ( Probability Calc) 18
  • 19. 7. Administrator (Manage Agents) DATA LEAKAGE DETECTION 19
  • 20. UML DIAGRAMS • Data Flow Diagram • Use Case Diagram • Class Diagram • Sequence Diagram • Activity Diagram 20 DATA LEAKAGE DETECTION
  • 21. 1. Data Flow Diagram Level 0 21 DATA LEAKAGE DETECTION
  • 23. Level 2 23 DATA LEAKAGE DETECTION Agent 2 Login View Data Send Data To Anonymous User Agent n Login View Data Agent 1 Login View Data . . . Administrator Email Notification
  • 24. 2. Use Case Diagram 24
  • 27. 5. Activity Diagram DATA LEAKAGE DETECTION 27
  • 28. ADVANTAGES  This system includes the data hiding along with the provisional software with which only the data can be accessed.  This system gives privileged access to the administrator (data distributor) as well as the agents registered by the distributors. Only registered agents can access the system. The user accounts can be activated as well as cancelled.  The exported file will be accessed only by the system. The agent has given only the permission to access the software and view the data. If the data is leaked by the agent’ system the path and agent information will be sent to the distributor thereby the identity of the leaked user can be traced. DATA LEAKAGE DETECTION 28
  • 29. FUTURE SCOPE DATA LEAKAGE DETECTION 29  Currently, we are dealing with only text files in this project but in future we will try to deal with all types of files.  Recent research papers say that it is not possible to find the exact guilty agent who has leaked the data. Instead, we are finding out the probability of the agent being guilty or who has leaked the data through calculation of number of downloads.  For more security, we will also provide a verification code on the agent’s mobile in future.
  • 30. CONCLUSION DATA LEAKAGE DETECTION 30 Login- Registration Module Upload file using secret key File sharing with agents Start HTTP server Check guilty agent Receives request for download Decrypts using secret key Java security framework Socket programming HTTP server Java swing API Technology Agent’s module Distributor’s module Data Leakage Detection System
  • 31. REFERENCES  “Data Leakage Detection”Panagiotis Papadimitriou, Student Member, IEEE, and Hector Garcia-Molina, Member, IEEE  R. Agrawal and J. Kiernan, “Watermarking Relational Databases,” Proc. 28th Int’l Conf. Very Large Data Bases (VLDB ’02), VLDB Endowment, pp. 155-166, 2002.  P. Bonatti, S.D.C. di Vimercati, and P. Samarati, “An Algebra for Composing Access Control Policies,” ACM Trans. Information and System Security, vol. 5, no. 1, pp. 1-35, 2002.  P. Buneman, S. Khanna, and W.C. Tan, “Why and Where: A Characterization of Data Provenance,” Proc. Eighth Int’l Conf. Database Theory (ICDT ’01), J.V. den Bussche and V. Vianu, eds., pp. 316-330, Jan. 2001  P. Buneman and W.-C. Tan, “Provenance in Databases,” Proc. ACM SIGMOD, pp. 1171-1173, 2007. 31 DATA LEAKAGE DETECTION
  • 32.  Y. Cui and J. Widom, “Lineage Tracing for General Data Warehouse Transformations,” The VLDB J., vol. 12, pp. 41- 58, 2003.  F. Hartung and B. Girod, “Watermarking of Uncompressed and Compressed Video,” Signal Processing, vol. 66, no. 3, pp. 283-301,  1998.  S. Jajodia, P. Samarati, M.L. Sapino, and V.S. Subrahmanian,“Flexible Support for Multiple Access Control Policies,” ACM  Trans. Database Systems, vol. 26, no. 2, pp. 214-260, 2001.  Y. Li, V. Swarup, and S. Jajodia, “Fingerprinting RelationalDatabases: Schemes and Specialties,” IEEE Trans. Dependable and  Secure Computing, vol. 2, no. 1, pp. 34-45, Jan.-Mar. 2005.  B. Mungamuru and H. Garcia-Molina, “Privacy, Preservation and Performance: The 3 P’s of Distributed Data Management,” technical report, Stanford Univ., 2008. DATA LEAKAGE DETECTION 32