Ijet 16108
Ijet 16108
Research paper
Abstract
Our system includes a data distributor who sends some important information to some third parties, called agents in our system. Some
data gets leaked and found in an unauthorized place (e.g., on the internet or somebody's PC). The distributor must be able to detect that
the data got leaked and came from one or more agents. Our system detects the guilty agent, who has leaked the data to untrusted agents.
For identification of leaked data in existing system uses watermarking technique. However, it has a deficiency that watermarking data
can be modified or changed. So, In proposed system another technique is used for improving chances of detecting guilty agent is MAC
(Media Access Control) address with some more prevention strategies to increase the security of the system.
Keywords: Data leakage, Data prevention, MAC address, Guilty agent, AES algorithm
Copyright © 2018 Authors. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted
use, distribution, and reproduction in any medium, provided the original work is properly cited.
International Journal of Engineering & Technology 367
of incorporating MAC address improves the possibility of Step 1: The authorised distributor, can check the Data Leakage
identifying guilty agents. Details, if there is any, after signing up.
Also, to prevent the sensitive content from getting leaked we tend Step 2: It is segregated into Primary and Secondary Leakage.
to use prevention strategies. Step 3: Primary leakage will display the guilty agent‟s name, file
name, MAC address, date and data receiver.
Techniques Used: Step 4: Secondary leakage has two columns, namely „Distributor
send file to agent‟ and „Agent Received file from distributor‟. It
Prevention Strategy 1: shows the no of files that the distributor has sent and the no of
times the agent has downloaded it.
Using Password Encryption Step 5: If the no. of times the file has been downloaded exceeds
Step 1: The authorized agent should fill the registration form and the no of files that were actually sent by the distributor, then that
provide a password. agent can be suspected of data leakage.
Step 2: After clicking on „register‟, the computer will take all the
details and it will get stored in SQL Database. 4. Result and Discussion
Step 3: The encrypted form of the password entered will be
displayed in the database, using AES Algorithm. So, only an
authenticated agent can send a data request with the required The proposed system has been implemented using JavaScript. We
credentials. have created our own dataset by registering the agent in the
Step 4: As the agent provides its email id and a password, a copy proposed system. The architecture diagram is shown below: agent.
of password will be sent to the provided email id, to prevent any So, our project aims at identifying the guilty agent by providing
fraudulent activity. the confidentiality of data.
Prevention Strategy 2:
identify the guilty agent using MAC address and Primary and
secondary Leakage. The AES algorithm encrypts the potential
5. Conclusion information. Hence, unauthorized agent is unable to obtain the
confidential data. And MAC address is used to identify the guilty
In this paper, it is explained that in an organization, most of their
potential information is shared to the trusted agents. But, they
cannot assure that the agent is loyal. So the desired objective of
the sender of the data is to detect the guilty agent who leaks the
data. So, this data leakage prevention and detection system can
368 International Journal of Engineering & Technology
References
[1] Panagiotis Papadimitriou, Hector Garcia-Molina, A Model for Data
Leakage Detection Stanford University.
[2] Panagiotis Papadimitriou, Hector Garcia-Molina, Data Leakage
Detection IEEE Transaction on Knowledge and Data Engineering,
Vol-23,No 1, January 2011 pp. 51-63
[3] Ajay Kumar, Ankit Goyal, Ashwini Kumar, Navneet Kumar
Chaudhary, Sowmya Kamath ,Comparative Evaluation of
Algorithms for Effective Data Leakage Detection, IEEE
Conference on Information and Communication Technologies (ICT
2013), pp. 177-182.
[4] Anush Koneru, G.Siva Nageswara Rao, J. Venkata Rao, Data
Leakage Detection Using Encrypted Fake Objects, International
Journal of P2P Network Trends and Technology Vol-3 Issue-2
2013 pp. 104-110
[5] B. Sruthi Patil, Mrs. M. L. Prasanthi, Modern Approaches for
Detecting Data Leakage Problem, , International Journal Of
Engineering And Computer Science, Vol-2, Issue-2, Feb 2013 pp.
395-399.
[6] Jaymala Chavan, Priyanka Desai, Relational Data Leakage
Detection using Fake Object and Allocation Strategies,
International Journal of Computer Applications, Vol-80, No.16 ,
October 2013 pp. 15-21.
[7] Rudragouda G Patil, Development of Data leakage Detection Using
Data Allocation Strategies, International Journal of Computer
Application in Engineering Sciences Vol-1, Issue-2, June 2011 pp.
197200.
[8] Sandip A. Kale, Prof. S. V. Kulkarni, Data Leakage Detection,
International Journal of Advanced Research in Computer and
Communication Engineering Vol-1, Issue-9, November 2012 pp.
668-678
[9] Jagna Ajay Kumar, K. Rajani Devi, An Efficient And Robust
Model For Data Leakage Detection System, Journal of Global
Research in computer Science, Vol-3, No-6, June 2012 pp. 91-95
[10] Chapter 2 Data Leakage http://www.springer.com/978-1-4614-
2052-1.