An Efficient Guilt Detection Approach for Identifying Data Leakages

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-25 Number-2
Year of Publication : 2015
Authors : Anand Kiran
DOI :  10.14445/22312803/IJCTT-V25P111

MLA

Anand Kiran "An Efficient Guilt Detection Approach for Identifying Data Leakages". International Journal of Computer Trends and Technology (IJCTT) V25(2):62-67, July 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
In this paper we develop a model for assessing the “guilt” of agents. We also present algorithms for distributing objects to agents, in a way that improves our chances of identifying a leaker. Finally, we also consider the option of adding “fake” objects to the distributed set. Such objects do not correspond to real entities but appear realistic to the agents. In a sense, the fake objects acts as a type of watermark for the entire set, without modifying any individual members. If it turns out an agent was given one or more fake objects that were leaked, then the distributor can be more confident that agent was guilty. A distributor owns a set T = {t1, t2, . . . , tm} of valuable data objects. The distributor wants to share some of the objects with a set of agents U1, U2,… Un, but does not wish the objects be leaked to other third parties. The objects in T could be of any type and size, e.g., they could be tuples in a relation, or relations in a database. An agent Ui receives a subset of objects Ri ? T, determined either by a sample request or an explicit request: • Sample request Ri = SAMPLE(T,mi): Any subset of mi records from T can be given to Ui. • Explicit request Ri = EXPLICIT(T, condi): Agent Ui receives all the T objects that satisfy condi. A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means.

References
[1] R. Agrawal and J. Kiernan,“Watermarking Relational Databases”Proc 28th Int’l Conf. Very Large Data Bases (VLDB ’02), VLDB Endowment, pp. 155-166, 2002.
[2] P. Bonatti, S.D.C. di Vimercati, and P. Samarati, “An Algebra for Composing Access Control Policies,” ACM Trans. Information and System Security, vol. 5, no. 1, pp. 1-35, 2002.
[3] P. Buneman, S. Khanna, and W.C. Tan, “Why and Where: A Characterization of Data Provenance,” Proc. Eighth Int’l Conf.Database Theory (ICDT ’01), J.V. den Bussche and V. Vianu, eds.,pp. 316-330, Jan. 2001.
[4] P. Buneman and W.-C. Tan, “Provenance in Databases,” Proc.ACM SIGMOD, pp. 1171-1173, 2007.
[5] Y. Cui and J. Widom, “Lineage Tracing for General Data Warehouse Transformations,” The VLDB J., vol. 12, pp. 41- 58,2003.
[6] S. Czerwinski, R. Fromm, and T. Hodes, “Digital Music Distribution and Audio Watermarking,”http://www.scientificcommons.org/43025658, 2007.
[7] F. Guo, J. Wang, Z. Zhang, X. Ye, and D. Li, “An Improved Algorithm to Watermark Numeric Relational Data,” Information Security Applications, pp. 138-149, Springer, 2006.
[8] F. Hartung and B. Girod, “Watermarking of Uncompressed and Compressed Video,” Signal Processing, vol. 66, no. 3, pp. 283-301,1998.
[9] S. Jajodia, P. Samarati, M.L. Sapino, and V.S. Subrahmanian, “Flexible Support for Multiple Access Control Policies,” ACM Trans. Database Systems, vol. 26, no. 2, pp. 214-260, 2001.
[10] Y. Li, V. Swarup, and S. Jajodia, “Fingerprinting Relational Databases: Schemes and Specialties,” IEEE Trans. Dependable and Secure Computing, vol. 2, no. 1, pp. 34-45, Jan.-Mar. 2005.
[11] B. Mungamuru and H. Garcia-Molina, “Privacy, Preservation and Performance: The 3 P’s of Distributed Data Management,”technical report, Stanford Univ., 2008.
[12] V.N. Murty, “Counting the Integer Solutions of a Linear Equation with Unit Coefficients,” Math. Magazine, vol. 54, no. 2, pp. 79-81,1981.
[13] S.U. Nabar, B. Marthi, K. Kenthapadi, N. Mishra, and R. Motwani,“Towards Robustness in Query Auditing,” Proc. 32nd Int’l Conf.Very Large Data Bases (VLDB ’06), VLDB Endowment, pp. 151-162,2006.
[14] P. Papadimitriou and H. Garcia-Molina, “Data Leakage Detection,”technical report, Stanford Univ., 2008.
[15] P.M. Pardalos and S.A. Vavasis, “Quadratic Programming with One Negative Eigenvalue Is NP-Hard,” J. Global Optimization,vol. 1, no. 1, pp. 15-22, 1991.

Keywords
Fake Object, Guilty Agent, Data Object, Third Party, Watermark, Data Warehousing.