You are on page 1of 9

Data Leakage Detection


We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebodys laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases we can also inject realistic but fake data records to further improve our chances of detecting leakage and identifying the guilty party.

The objective of the system is to detect when the distributors sensitive data has been leaked by hackers, and if possible to identify the agent that leaked the data.

Existing System
The Existing System can detect the hackers but the total no of cookies (evidence) will be less and the organization may not be able to proceed legally for further proceedings due to lack of good amount of cookies and the chances to escape of hackers are high.

Proposed system
In the Proposed System the hackers can be traced with good amount of evidence. In this proposed system the leakage of data is detected by the following methods viz.., generating Fake objects, Watermarking and by Encrypting the data.

Module1 Module 2 Module 3 : Administrator Module : Employees Module : Data Leakage Detection Module

Administrator Module: All the privileges of the website are only available with the administrator. Admin has privileges to accomplish the following responsibilities/tasks: Manage Users (Add, Edit, Delete, Lock/Unlock, Assign

Permissions). Manage Articles (Add, Edit, Update, Delete). Manage Categories (Add, Edit, Update, Delete). Send Messages Upload Documents

Employee Module: Some of the privileges are restricted to the employee by the administrator. Only few permissions are available with the employees. Employees have the following task/responsibilities. Employees have Read-only access to the content. Employees can Read the articles Download the Documents Read the messages which are send by the Admin Discuss the content in the Discussion Board.

Data Leakage Detection: The main scope of this module is provide complete information about the data/content that is accessed by the users within the website. Forms Authentication technique is used to provide security to the website in order to prevent the leakage of the data. Continuous observation is made automatically and the information is send to the administrator so that he can identify whenever the data is leaked. Above all the important aspect providing proof against the Guilty Objects. The following techniques are used. o Fake Object Generation. o Watermarking.

Flow Char for implementation of the following Alogirhtms: (a)Allocation for Explict Data Request(EF) with fake objects (b) Agent Selection for e-random and e-optimal IN Both the above case CREATEFAKCEOBJECT() METHOD GENERATES A FAKEOBJECT. User Request R Explicit Start

Check the Condition Select the agent and add the fake. IF B> 0



object Evaluate The Loop. Create Fake Object is Invoked Loop Iterates for n number of requests User Receives the Output.


Flow Char for implementation of the following Alogirhtms: (a) Allocation for Sample Data Request(EF) without any fake objects: (b) Agent Selection for e-random and e-optimal In Both the following cases Select Method() returns the value of Ri n Rj Start

User Request R Explicit Check the Condition Select the agent and add the fake. Evaluate The Loop. IF B> 0 the User Receives Stop SelectObject() Method is Output.

Loop Iterates for n number of





Software Requirements: Language Technologies IDE Operating System : Servlets, JSP : JAVA : Visual Studio 2008 : Microsoft Windows XP SP2 or Later Version

Hardware Requirements: Processor : Intel Pentium or more

RAM Hard Disk

: 512 MB (Minimum) : 40 GB