IRJET- Data Leakage Detection using Guilty Agent Model

Page 1

International Research Journal of Engineering and Technology (IRJET) Volume: 08 Issue: 08 | Aug 2021

www.irjet.net

e-ISSN: 2395-0056 p-ISSN: 2395-0072

Data Leakage Detection using Guilty Agent Model Muskan Gupta1, Harshita Pundir2 1Vellore

Institute of Technology, School of Computer Science and Engineering, Vellore - 632 014, Tamil Nadu, India Institute of Technology, School of Computer Science and Engineering, Vellore - 632 014, Tamil Nadu, India -----------------------------------------------------------------------------***----------------------------------------------------------------------2Vellore

Abstract: Current statistics from various security research firms and government agencies recommend that there has been a rapid growth

of data leaks over the past eight years and as of the present world, for the most part, depends on information exchange i.e., data transfer from one individual to another, also known as the distributary system. Data leakage is a serious security concern for every organization, and the first step to solving this problem is to find the source of the data leakage. This project works by saving the data from being outsourced by restricting the agents by using blacklisting so that it cannot be leaked.

Keywords: Blacklisting, Data leakage detection, Guilty agent, Probability. We here aim to build an application that will monitor if on the off chance any data has been leaked by the agent of the 1. Introduction enterprise. Additionally, here we ensure proper authentication among agents/users accessing the system so Current statistics from various security research firms and that data is accessed only by the valid users. It likewise government agencies recommend that there has been a helps in discovering Guilt of Agent from the given set of rapid growth of data leak over the past eight years and as agents who has leaked the data, and therefore needs to be of the present world largely depends on the exchange of blacklisted, using Probability Distribution to find the guilt information i.e., transfer of data from one individual to using the guilt model. another, also known as the distributary system. Information sent from the distributor to the client is 3. Literature Review confidential and therefore the information is only exchanged between the distributor and the trusted third parties. The information provided by the distributor should In paper [1], N. Kumar uses the Bell-Lapadula Model for be secured, private, confidential and must not be Data Leakage detection where the server adds image duplicated as the information imparted with the trusted logo to the archives. The logic behind the application of third parties is confidential and profoundly significant. In this technique is to embed classified message into the certain events, the data send by the distributor is document in a computer-efficient manner. ASCII code is duplicated by various agents which inflicts enormous harm appended to documents and AES is used with SHA-512 to the facility and this process of data loss is known as data to validate the hash algorithm. The main focus here is leakage. Data leakage should be detected early in order to that only authorized clients will be able to access prevent the data form becoming an open source. This important documents. The created watermark is sent to project works by saving the data from being outsourced by the client with the public key certificates. This technique restricting the agents by using blacklisting so that it cannot becomes infeasible to extend to web environment where multiple users access data. be leaked. In paper [2], Hybrid watermarking algorithms are used by R. Naik for leakage detection, the model is made out of three fundamental components, first is to extract the data being moved and to create a QR code utilizing data structures. At that point insert QR watermark into the cloud data utilizing frequency domain techniques. At last estimate if anyone has altered the information by looking at the current data features and finding the guilty agent who has leaked the data by extracting watermark and comparing data from watermark with agent’s details. The issue faced is that Watermarks involve some modification of the original information and can sometimes be destroyed if the data recipient is malicious.

2. Problem statement and objective Throughout course of doing business, once in a while sensitive information should be provided to reputable organizations. For instance, a medical clinic may give patient records to specialists who will need the data to devise new treatments. Similarly, an organization may have partnerships with different organizations that require sharing client data. Another venture maybe to redistribute it for data processing, so the information needs to be sent to various other organizations. The owner of the information is the distributor and the socalled trusted third parties are the agents. At that point further data will be given by the distributor to the trusted third party of the enterprise utilizing this application.

© 2021, IRJET

|

Impact Factor value: 7.529

In paper [3], X. Shu has carried out the Fuzzy fingerprint technique. This framework satisfies high recognition |

ISO 9001:2008 Certified Journal

|

Page 3696


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.