Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
com
Seminar
On
Data Leakage
Detection
Submitted To:
www.careersplay.com
Submitted By:
www.careersplay.com
Introduction
In
OBJECTIVE
A
OBJECTIVE
These
EXISTING SYSTEM
Traditionally, leakage
detection is handled by
watermarking, e.g., a unique code is embedded in each
distributed copy.
If that copy is later discovered in the hands of an
unauthorized party, the leaker can be identified.
Disadvantages of Existing
Systems
Watermarks
PROPOSED SYSTEM
Our
PROPOSED SYSTEM
Implementation
The
Implementation
Data Allocation:
Implementation
Optimization:
Modules
Admin Module
Administrator has to logon to the system.
Admin can add information about a new
user.
Admin can add/view/delete/edit the user
details.
Admin can create user groups and place
users in it.
Modules
User Module
A user must login to use the services.
A user can send data sharing requests to
other users.
A user can accept/reject data sharing
requests from other users.
A user can trace the flow of its data i.e.
can see what all users possess its data.
Conclusion
In
Thanks.