Get Latest Final Year Computer Projects in your Email

Your Email ID:
FYP.in Subs

Data Leakage Detection – 1

Download Project:

Fields with * are mandatory

Perturbation is a very useful technique where the data is modified and made ‘less sensitive ́ before being handed to agents. For example, one can add random noise to certain attributes, or one can replace exact values by ranges.

However, in some cases it is important not to alter the original distributor’s data. For example, if an outsourcer is doing our payroll, he must have the exact salary and customer bank account numbers. If medical researchers will be treating patients (as opposed to simply computing statistics), they may need accurate data for the patients. Traditionally, leakage detection is handled by watermarking, e.g., a unique code is embedded in each distributed copy.

If that copy is later discovered in the hands of an unauthorized party, the leaker can be
identified. Watermarks can be very useful in some cases, but again, involve some modification of the original data. Furthermore, watermarks can sometimes be destroyed if the data recipient is malicious. In this paper we study unobtrusive techniques for detecting leakage of a set of objects or records. Specifically we study the following scenario: After giving a set of objects to agents, the distributor discovers some of those same objects in an unauthorized place.
Source: IJCSCN
Author: Rekha Jadhav

Download Project

Download Data Leakage Detection

Download Project:

Fields with * are mandatory