QUIZ GAME
Transcript: REQUIREMENTS 1) Traditionally, leakage detection is handled by watermarking, e.g., a unique code is embedded in each distributed copy 2) If that copy is later discovered in the hands of an unauthorized party, the leaker can be identified 3) watermarks can sometimes be destroyed if the data recipient is malicious 4)Watermarks can be very useful in some cases, but again, involve some modification of the original data 5)Another enterprise may outsource its data processing, so data must be given to various other companies. We call the owner of the data the distributor and the supposedly trusted third parties the agents DATA LEAKAGE DETECTION 5) Watermarks can be very useful in some cases, but again, involve some modification of the original data 6) In this paper we study unobtrusive techniques for detecting leakage of a set of objects or records 7)We also present algorithms for distributing objects to agents, in a way that improves our chances of identifying a leaker 8) If it turns out an agent was given one or more fake objects that were leaked, then the distributor can be more confident that agent was guilty P-IV - 3.0Ghz 865/915 Chipset 800 Mhz FSB 512 MB RAM 80 GB 7200 RPM HARDRIVE CD-ROM DRIVE 10/100 NIC OPTICAL WHEEL MOUSE KEY BOARD 11+ INCHES COLOUR MONITOR SOFTWARE K.VIKHYATH KUMAR -13AG1A0554 K.VENKAT SHASHI KUMAR -13AG1A0555 A.BALAKRISHNA -14AG5A0501 PROPOSED MODULES EXISTING SYSTEM 1) Our goal is to detect when the distributor’s sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data 2) Perturbation is a very useful technique where the data is modified and made “less sensitive” before being handed to agents 3) We develops unobtrusive techniques for detecting leakage of a set of objects or record DEVELOPED THANK YOU REQUIREMENTS HARDWARE 1. In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties 2.We call the owner of the data the distributor and the supposedly trusted third parties the agents 3. Our goal is to detect when the distributor’s sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data 4. Perturbation is a very useful technique where the data is modified and made “less sensitive” before being handed to agents DESCRIPTION operating system : windows xp/2003 or Linux/Solaris user interface : HTML,CSS client-side scripting : javascript programming language : java(JDBC,servlets,JSP) IDE/Workbench : Eclipse with My Eclipse plug in Database : MySQL Web Server : Apache Tomcat 7.0 Technology : JDK 1.7 Data Distributor Login Send file to agent View sent files View Leaked file details Agent/User Register Login Send files View distributor files Download file BY PROPOSED MODULES