Professional Documents
Culture Documents
Project Guide
Mr.M.Arun Kumar.
AIM
mThe distributor must assess the likelihood that the leaked data came from
one or more agents, as opposed to having been independently gathered by
other means.
Owner of the Data
Ôistributor
Third Parties
Agents
à isting System
|
If that copy is later discovered in the hands of an unauthorized party, the leaker can
be identified.
Watermarks can be very useful in some cases. but again, involve some modification
of the original data.
Proposed System
O
O
2
mO
m
mO
O O
m O
O
4
Th
v
h
vh
v h h
v
h v h h
vh
h
Username/
Ôistributor
Password
Welcome
page Login
Agent Username/
Password
ã
AGàT SIGUP
V3] P. B neman and W.- . Tan. Provenance in databases. In SIG OÔ ͛07: Proceedings of
the 2007 A SIG OÔ international conference on anagement of data, pages 1171ʹ
1173, ew York, Y, USA, 2007. A .
V4] Y. Cui and J. Widom. Lineage tracing for general data
warehouse transformations. In The VLÔB Journal, pages 471ʹ
480, 2001.
www.ieeeprojects.com
www.skiveprojects.com