You are on page 1of 32

Organisation- SSR SOFT

Mentor- Dr. SMRITI AGARWAL




Name- G LAVANYA
Roll no- 10671A1228
ABSTRACT
Goal is to detect when the distributors sensitive data has been
leaked by agents, and if possible to identify the agent that
leaked the data.
To provide data allocation strategies across the agents that
improve the probability of identifying leakages.
Perturbation is a very useful technique where the data is
modified and made less sensitive before being handed to
agents.

SLIDE 2 of 30

JBIET-DEPARTMENT OF IT
To inject realistic but fake data records to further improve
our chances of detecting leakage and identifying the guilty
party.
Adding fake objects to the distributed set acts as a type of
watermark for the entire set, without modifying any individual
members.
SLIDE 3 of 30

JBIET-DEPARTMENT OF IT
INTRODUCTION
Existing system:
Leakage detection is handled by watermarking.
Watermarks can sometimes be destroyed if the data recipient is
malicious.
Proposed system:
We develop unobtrusive techniques for detecting leakage of a set
of objects or records.
We also present algorithms for distributing objects to agents.


SLIDE 4 of 30

JBIET-DEPARTMENT OF IT
ALGORITHMS USED:
i. Sample request
ii. Explicit request
To see whether fake objects in the distributed data sets yield
significant improvement in our chances of detecting a guilty
agent
To evaluate our e-optimal algorithm relative to a random
allocation.

SLIDE 5 of 30

JBIET-DEPARTMENT OF IT
FEASIBILITY STUDY
The main objective of the feasibility study is to test the
Technical, Operational and Economical feasibility for adding
new modules and debugging old running system.
TECHNICAL FEASIBILITY:
Does the necessary technology exist to do what is suggested?
Can the system be upgraded if developed?

SLIDE 6 of 30

JBIET-DEPARTMENT OF IT
Will the proposed system provide adequate response to
inquiries, regardless of the number or location of users?
OPERATIONAL FEASIBILITY:
Is there sufficient support for the management from the users?
Will the system be used and work properly if it is being
developed and implemented?

SLIDE 7 of 30 JBIET-DEPARTMENT OF IT
Will there be any resistance from the user that will undermine
the possible application benefits?
ECONOMICAL FEASIBILITY:
In this, the development cost in creating the system is
evaluated against the ultimate benefit derived from the new
systems.
If financial benefits equals or exceeds the costs, then system is
economically feasible.
SLIDE 8 of 30

JBIET-DEPARTMENT OF IT
Hardware Requirements:
System : Pentium IV 2.4 GHz
Hard Disk : 40 GB
Floppy Drive : 1.44 MB
Monitor : 15 VGA colour
Mouse : Logitech.
Keyboard : 110 keys enhanced.
RAM : 256 MB

SLIDE 9 of 30

JBIET-DEPARTMENT OF IT
Software Requirements:
O/S : Windows XP/7.
Language : JAVA 1.6, JSP
Data Base : My Sql

SLIDE 10 of 30

JBIET-DEPARTMENT OF IT
SYSTEM ARCHITECTURE
SLIDE 11 of 30

JBIET-DEPARTMENT OF IT
DESIGN
Data Flow Diagram
SLIDE 12 of 30

JBIET-DEPARTMENT OF IT
JBIET-DEPARTMENT OF IT SLIDE 13 of 30

SLIDE 14 of 30

JBIET-DEPARTMENT OF IT
SLIDE 15 of 30

JBIET-DEPARTMENT OF IT
SLIDE 16 of 30

JBIET-DEPARTMENT OF IT
IMPLEMENTATION
JAVA:
Is both a programming language and a platform.
The program is both compiled and interpreted.
Compiler translates a program into an intermediate
language called Java byte codes -the platform-
independent codes interpreted by the interpreter on
the Java platform.

SLIDE 17 of 30

JBIET-DEPARTMENT OF IT
MODULES:
i. Data Allocation Module:
Includes data allocation intelligently by the distributor to
agents in order to improve the chances of detecting a
guilty agent.
ii. Fake Object Module:
The distributor creates and adds fake objects to the data.
Fake objects are generated by the distributor to increase
the chances of detecting agents that leak data.

SLIDE 18 of 30

JBIET-DEPARTMENT OF IT
iii. Optimization Module:
Is the distributors data allocation to agents has
one constraint and one objective.
iv. Data Distributor:
Assessing the likelihood that the leaked data came
from one or more agents, as opposed to having been
independently gathered by other means.
SLIDE 19 of 30

JBIET-DEPARTMENT OF IT
JSP:
Is a technology for developing web pages that support
dynamic content which helps developers insert java code in
HTML pages.
JSP tags are used for a variety of purposes, such as
retrieving information from a database or registering user
preferences, accessing JavaBeans components, passing
control between pages.


SLIDE 20 of 30

JBIET-DEPARTMENT OF IT
ADVANTAGES OF JSP:
Performance is significantly better.
JSP are always compiled.
JavaServer Pages are built on top of the Java Servlets
API.
JSP pages can be used in combination with servlets
that can handle the business logic.

SLIDE 21 of 30

JBIET-DEPARTMENT OF IT
TESTING
The process of validating and verifying that a software product
meets the requirements that guide its design and development
and satisfies the needs of stakeholders.
WHITE BOX TESTING:
Tests internal structures or workings of a program, as opposed to
the functionality exposed to the end-user.
Is applied at the unit, integration and system levels of
the software testing process
SLIDE 22 of 30

JBIET-DEPARTMENT OF IT
Is helpful in ensuring correct functionality.
BLACK BOX TESTING:
Examines functionality without peering into its
internal structures or workings
Can be applied to virtually every level of software
testing: unit, integration, system and acceptance.

SLIDE 23 of 30

JBIET-DEPARTMENT OF IT
RESULTS
Distributor login
SLIDE 24 of 30

JBIET-DEPARTMENT OF IT
Distributor sending files
SLIDE 25 of 30

JBIET-DEPARTMENT OF IT
View key
SLIDE 26 of 30

JBIET-DEPARTMENT OF IT
Sending files to agent
SLIDE 27 of 30 JBIET-DEPARTMENT OF IT
User registration
SLIDE 28 of 30

JBIET-DEPARTMENT OF IT
CONCLUSION
The model is relatively simple, but captures the
essential trade-offs. The algorithms we have presented
implement a variety of data distribution strategies that
can improve the distributors chances of identifying a
leaker.
The future work includes the investigation of agent
guilt models that capture leakage scenarios.
.
SLIDE 29 of 30

JBIET-DEPARTMENT OF IT
REFERENCES
User Interfaces in C#: Windows Forms and Custom Controls
by Matthew MacDonald.
Computer Networking: A Top-Down Approach, by James F.
Kurose.
http://www.networkcomputing.com/
http://www.ieee.org



SLIDE 30 of 30 JBIET-DEPARTMENT OF IT
Thanking you

You might also like