You are on page 1of 25

| |  


 
  
 

   


 
Batch Members:
R.Ashwini- 50707104011
S.Indhumathi- 50707104029
H.Gayathiri- 50707104022

Project Guide
Mr.M.Arun Kumar.
AIM

We develop v v techniques for


detecting leakage of a set of objects or
records and a model for assessing the
͞guilt͟ of agents.
We Consider this scenario

mA data distributor has given sensitive data to a set of supposedly trusted


agents.

mSome of the data is leaked and found in an unauthorized place.

mThe distributor must assess the likelihood that the leaked data came from
one or more agents, as opposed to having been independently gathered by
other means.
Owner of the Data
Ôistributor

Third Parties
Agents


à isting System

|  
        
    



 
        


     

           
  
  
  

If that copy is later discovered in the hands of an unauthorized party, the leaker can
be identified.

Watermarks can be very useful in some cases. but again, involve some modification
of the original data.
Proposed System

ͻ We develop v v techniques for detecting


leakage of a set of objects or records

ͻ we also consider the option of adding ͞fake͟ objects to


the distributed set. Such objects do not correspond to
real entities but appear.

ͻ we develop a model for assessing the ͞guilt͟ of agents.


Architecture Ôiagram
Ôata passing to
Agent͛s data transfer
ÔATABASà the agents ÔISTRIBUTOR
AGàT

Fake agent͛s record stored for


Illegal guilt model analysis
transfer of Probability calculation Ôata transfer to the
data through fake objects agents

FAKà AGàTS PROBABILITY ÔISTRIBUTIO


OF FAKà AGàTS
Ô  Ô 

O 

 

   

 

  


  
 

   
 

O  
2 

mO   

m
   

m O
O  O

m   O
O
4  
 

Th 
 v 
      h
vh  v      h h
 v 
 h   v  h  h  
vh  h   
Username/
Ôistributor
Password

Welcome
page Login
Agent Username/
Password
ã    
 

* Accepting Username and password from ! 


!! 
the ne t step is that data transfer to
the V TS.
* This module is mainly designed to transfer data
from the distributor to the agents

* Accepting Username and password from ! 


 !, the ne t step is transfer from authorized
agents to other agents.
*The data is transferred through the server IP of
the agent using AGàT IÔ.
ÔISTRIBUTOR ALLOCATà SàÔ ÔATA USIG
FUCTIO ÔATA FTP

AGàT SIGUP
     


* This module is designed using the agent guilt


model. Here a count value(also called as fake objects)
are incremented for any transfer of data occurrence
when agent transfers data.

* Fake objects are stored in database. Fake objects


acts as a type of watermark for the entire set, without
modifying any individual content. Fake objects are
added in this module by the distributor to determine
the guilt agents.
K     
*This module is mainly designed for determining
unauthorized agents. This module uses fake objects
(which is stored in database from guilt model module)
and determines the guilt agent along with the
probability.

*A graph is to plot the probability distribution of data


which is leaked by fake agents.

*In the probability distribution function the agent Id is


given to determine the guilt agent, if the distribution
function is high, then the agent is found to be GUILT.
Y  Y  

V1] R. Agarwal and J. Kiernan. Watermarking relational databases. In VLÔB ͛02:


Proceedings of the 28th international conference on Very Large Ôata Bases,
pages 155ʹ166. VLÔB àndowment, 2002.

V2] P. Bonatti, S. Ô. . di Vimercati, and P. Samarati. An algebra for composing


access control policies. A Trans. Inf. Syst. Sec r., 5(1):1ʹ35, 2002.

V3] P. B neman and W.- . Tan. Provenance in databases. In SIG OÔ ͛07: Proceedings of
the 2007 A SIG OÔ international conference on anagement of data, pages 1171ʹ
1173, ew York, Y, USA, 2007. A .
V4] Y. Cui and J. Widom. Lineage tracing for general data
warehouse transformations. In The VLÔB Journal, pages 471ʹ
480, 2001.

www.ieeeprojects.com

www.skiveprojects.com

You might also like