Professional Documents
Culture Documents
ABSTRACT
A data distributor has given sensitive data to a set of supposedly trusted agents. Sometimes data is leaked and found in unauthorized place e.g., on the web or on somebody's laptop. Data leakage happens every day when confidential business information are leaked out. When these are leaked out it leaves the company unprotected and goes outside the jurisdiction of the corporation.
Motivation
In the past few years ,there has been a sharp increase in data leakage from many organizations. According to 2006, the FBI computer crime and security survey, Data leakage is the greatest source of financial loss of organization. The above issues motivated to me to choose this project.
Objective
The objective of this project is to improve the probability of identifying leakages using Data allocation strategies across the agents and also to identify the guilty party who leaked the data by injecting realistic but fake data records.
Problem Statement
In the course of doing business, sometimes sensitive data must be given to trusted third parties. Some of the data is leaked and found in an unauthorized place. The distributor cannot blame the agent without any evidence. This project identifies the agent who leaked the data with enough evidence.
2. 3.
Algorithm used to distribute the objects to agents that improves the chances of identifying a leaker. Realistic but fake objects is injected to the distributed set. Leakers cannot argue that they did not leak the confidential data, because this system traces leakers with good amount of evidence.
Block diagram
Database Distributor E-Random (Algorithm) Explicit Data request Add the fake objects to the original data View Data to transfer the agents
Request data
Agent
E-Optimal (Algorithm)
Modules
1.
2. 3. 4.
Data allocation module Fake object module Optimization module Data distributor module
The main focus of our project is the data allocation problem as how can the distributor intelligently give data to agents in order to improve the chances of detecting a guilty agent.
Optimization Module:
The Optimization Module is the distributors data allocation to agents has one constraint and one objective. The distributors constraint is to satisfy agents requests, by providing them with the number of objects they request or with all available objects that satisfy their conditions. His objective is to be able to detect an agent who leaks any portion of his data.
Data Distributor:
A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebodys laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means.
References
P. Papadimitriou and H. Garcia-molina Data leakage detection " IEEE Transaction on knowledge and data engineering, pages 51-63 volume 23,2011 P.M Pardalos and S.A Vavasis,Quadratic programming with one negative Eigen value is NP-Hard, J. Global Optimization. Vol 1, no 1, pp. IEEE conference paper: Agrawal and J. Kiernan. Watermarking relational databases. In VLDB 02: Proceedings of the 28th international conference on Very Large Data Bases, pages 155166. VLDB Endowment, 2002 Y. Cui and J. Widom. Lineage tracing for general data warehouse transformations. In The VLDB Journal, pages 471480, 2001.