25-08-2014, 11:44 AM
Data leakage detection
DATA LEAKAGE.pptx (Size: 779.4 KB / Downloads: 15)
INTRODUCTION
In the course of doing
business, sometimes
sensitive data must be
handed over to supposedly
trusted third parties.
Our goal is to detect when
the distributor's sensitive
data has been leaked by
agents, and if possible to
identify the agent that
leaked the data.
PROPOSED SYSTEM
. In the course of doing business,
sometimes sensitive data must be
handed over to supposedly trusted third
parties.
Our goal is to detect when the
distributor's sensitive data has been
leaked by agents, and if possible to
identify the agent that leaked the data
Analysis
Distributor (D) is a system which will distribute data to agents
Valuable Data (T) is the set of sensitive data which the system is going to send to the agents
Agent (U) is the set of agents to whom the system is going to send sensitive data.
Request from client will be either sample request or explicit request.
CONCLUSION
In the real scenario there is no need to hand over the sensitive data to the agents who will unknowingly or maliciously leak it.
However, in many cases, we must indeed work with agents that may not be 100 percent trusted, and we may not be certain if a leaked object came from an agent or from some other source.
In spite of these difficulties, it is possible to assess the likelihood that an agent is responsible for a leak, based on the overlap of his data with the leaked data .
The algorithms we have presented implement a variety of data distribution strategies that can improve the distributor’s chances of identifying a leaker.