Name- G LAVANYA Roll no- 10671A1228 ABSTRACT Goal is to detect when the distributors sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data. To provide data allocation strategies across the agents that improve the probability of identifying leakages. Perturbation is a very useful technique where the data is modified and made less sensitive before being handed to agents.
SLIDE 2 of 30
JBIET-DEPARTMENT OF IT To inject realistic but fake data records to further improve our chances of detecting leakage and identifying the guilty party. Adding fake objects to the distributed set acts as a type of watermark for the entire set, without modifying any individual members. SLIDE 3 of 30
JBIET-DEPARTMENT OF IT INTRODUCTION Existing system: Leakage detection is handled by watermarking. Watermarks can sometimes be destroyed if the data recipient is malicious. Proposed system: We develop unobtrusive techniques for detecting leakage of a set of objects or records. We also present algorithms for distributing objects to agents.
SLIDE 4 of 30
JBIET-DEPARTMENT OF IT ALGORITHMS USED: i. Sample request ii. Explicit request To see whether fake objects in the distributed data sets yield significant improvement in our chances of detecting a guilty agent To evaluate our e-optimal algorithm relative to a random allocation.
SLIDE 5 of 30
JBIET-DEPARTMENT OF IT FEASIBILITY STUDY The main objective of the feasibility study is to test the Technical, Operational and Economical feasibility for adding new modules and debugging old running system. TECHNICAL FEASIBILITY: Does the necessary technology exist to do what is suggested? Can the system be upgraded if developed?
SLIDE 6 of 30
JBIET-DEPARTMENT OF IT Will the proposed system provide adequate response to inquiries, regardless of the number or location of users? OPERATIONAL FEASIBILITY: Is there sufficient support for the management from the users? Will the system be used and work properly if it is being developed and implemented?
SLIDE 7 of 30 JBIET-DEPARTMENT OF IT Will there be any resistance from the user that will undermine the possible application benefits? ECONOMICAL FEASIBILITY: In this, the development cost in creating the system is evaluated against the ultimate benefit derived from the new systems. If financial benefits equals or exceeds the costs, then system is economically feasible. SLIDE 8 of 30
JBIET-DEPARTMENT OF IT Hardware Requirements: System : Pentium IV 2.4 GHz Hard Disk : 40 GB Floppy Drive : 1.44 MB Monitor : 15 VGA colour Mouse : Logitech. Keyboard : 110 keys enhanced. RAM : 256 MB
SLIDE 9 of 30
JBIET-DEPARTMENT OF IT Software Requirements: O/S : Windows XP/7. Language : JAVA 1.6, JSP Data Base : My Sql
SLIDE 10 of 30
JBIET-DEPARTMENT OF IT SYSTEM ARCHITECTURE SLIDE 11 of 30
JBIET-DEPARTMENT OF IT DESIGN Data Flow Diagram SLIDE 12 of 30
JBIET-DEPARTMENT OF IT JBIET-DEPARTMENT OF IT SLIDE 13 of 30
SLIDE 14 of 30
JBIET-DEPARTMENT OF IT SLIDE 15 of 30
JBIET-DEPARTMENT OF IT SLIDE 16 of 30
JBIET-DEPARTMENT OF IT IMPLEMENTATION JAVA: Is both a programming language and a platform. The program is both compiled and interpreted. Compiler translates a program into an intermediate language called Java byte codes -the platform- independent codes interpreted by the interpreter on the Java platform.
SLIDE 17 of 30
JBIET-DEPARTMENT OF IT MODULES: i. Data Allocation Module: Includes data allocation intelligently by the distributor to agents in order to improve the chances of detecting a guilty agent. ii. Fake Object Module: The distributor creates and adds fake objects to the data. Fake objects are generated by the distributor to increase the chances of detecting agents that leak data.
SLIDE 18 of 30
JBIET-DEPARTMENT OF IT iii. Optimization Module: Is the distributors data allocation to agents has one constraint and one objective. iv. Data Distributor: Assessing the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. SLIDE 19 of 30
JBIET-DEPARTMENT OF IT JSP: Is a technology for developing web pages that support dynamic content which helps developers insert java code in HTML pages. JSP tags are used for a variety of purposes, such as retrieving information from a database or registering user preferences, accessing JavaBeans components, passing control between pages.
SLIDE 20 of 30
JBIET-DEPARTMENT OF IT ADVANTAGES OF JSP: Performance is significantly better. JSP are always compiled. JavaServer Pages are built on top of the Java Servlets API. JSP pages can be used in combination with servlets that can handle the business logic.
SLIDE 21 of 30
JBIET-DEPARTMENT OF IT TESTING The process of validating and verifying that a software product meets the requirements that guide its design and development and satisfies the needs of stakeholders. WHITE BOX TESTING: Tests internal structures or workings of a program, as opposed to the functionality exposed to the end-user. Is applied at the unit, integration and system levels of the software testing process SLIDE 22 of 30
JBIET-DEPARTMENT OF IT Is helpful in ensuring correct functionality. BLACK BOX TESTING: Examines functionality without peering into its internal structures or workings Can be applied to virtually every level of software testing: unit, integration, system and acceptance.
SLIDE 23 of 30
JBIET-DEPARTMENT OF IT RESULTS Distributor login SLIDE 24 of 30
JBIET-DEPARTMENT OF IT Distributor sending files SLIDE 25 of 30
JBIET-DEPARTMENT OF IT View key SLIDE 26 of 30
JBIET-DEPARTMENT OF IT Sending files to agent SLIDE 27 of 30 JBIET-DEPARTMENT OF IT User registration SLIDE 28 of 30
JBIET-DEPARTMENT OF IT CONCLUSION The model is relatively simple, but captures the essential trade-offs. The algorithms we have presented implement a variety of data distribution strategies that can improve the distributors chances of identifying a leaker. The future work includes the investigation of agent guilt models that capture leakage scenarios. . SLIDE 29 of 30
JBIET-DEPARTMENT OF IT REFERENCES User Interfaces in C#: Windows Forms and Custom Controls by Matthew MacDonald. Computer Networking: A Top-Down Approach, by James F. Kurose. http://www.networkcomputing.com/ http://www.ieee.org
SLIDE 30 of 30 JBIET-DEPARTMENT OF IT Thanking you