Preview

Data Leakage Detection

Good Essays
Open Document
Open Document
12495 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Leakage Detection
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING,

VOL. 23,

NO. 1,

JANUARY 2011

51

Data Leakage Detection
Panagiotis Papadimitriou, Student Member, IEEE, and Hector Garcia-Molina, Member, IEEE
Abstract—We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases, we can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party. Index Terms—Allocation strategies, data leakage, data privacy, fake records, leakage model.

Ç
1 INTRODUCTION we study the following scenario: After giving a set of objects to agents, the distributor discovers some of those same objects in an unauthorized place. (For example, the data may be found on a website, or may be obtained through a legal discovery process.) At this point, the distributor can assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. Using an analogy with cookies stolen from a cookie jar, if we catch Freddie with a single cookie, he can argue that a friend gave him the cookie. But if we catch Freddie with five cookies, it will be much harder for him to argue that his hands were not in the cookie jar. If the distributor sees “enough evidence” that an agent leaked data, he may stop doing business with him, or may initiate legal proceedings. In this paper, we develop a model for assessing the “guilt” of agents. We also

You May Also Find These Documents Helpful

  • Good Essays

    Eventually, fear of legal liability forces them to expose the deviance. In the case, “Why Should My Conscience Bother Me?,” B.F. Goodrich Co., created a faulty aircraft break. The people within the company knew that the break would fail if it was used, but they continued to forge tests…

    • 754 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cross 9e TBB U05

    • 464 Words
    • 3 Pages

    Nikita, an employee-agent of Operational Processes, Inc., is authorized to access company trade secrets. Nikita downloads those secrets onto a thumb drive. She then quits Operational’s employ and goes to work for Quantum Analysis, Inc., an Operational competitor, with whom she shares the secrets. With respect to the agent’s duty of loyalty to her principal, this is…

    • 464 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    Undoubtedly in secure DBMS, it is feasible for clients to draw gatherings from the data they get from the database. The employee working in an organization when gets certain information they may try to elaborate it or draw some important aspects related to the database from past. There are two crucial events of the finding issue, which ordinarily climb in database systems.…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    However, too many organizations fail to identify the potential threats from information unintentionally leaked, freely available over the Internet, and not normally identifiable from standard log file analysis. Most critically, an attacker can passively gather this information without ever coming into direct contact with the organizations servers – thus being essentially undetectable. Very little information has been publicly discussed about arguably one of the least understood, and most significant stages of penetration testing – the process of Passive Information Gathering. This technical paper and information gathering plan reviews the processes and techniques related to the discovery of leaked information. It also includes details on both the significance of the leaked information, and steps organizations should take to halt or limit their exposure to this threat.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 533 Words
    • 3 Pages

    Organizations are under increased pressure to audit every action that a user performs within a database. This is due to increased focus on security, risk, accountability and avoidance of fraud and corruption. While security prevention measures (logins, firewalls, tokens etc.) are important to prevent unauthorized access to the data in the first place, as this survey shows, most breaches occur by users who are authorized but are either negligent or malicious.…

    • 533 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Powerful Essays

    As the world evolves through time, the business industry keeps on developing, indicating a fast growth rate of the numbers of merchants around the globe. Each seller will try to sell their goods and services more than their rivals and this merely shows that the current competition is extensive. Since sellers are eager to sell their goods and services, the buyer is often mislead and trapped into business dealings which the buyer’s have had to regret in the end. In order to succeed in their business dealings, the seller, in many situations, tend to withhold important information regarding the good or service they are selling. ‘Consider an injury caused by a product. A person consumes contaminated ginger beer. A child’s toy snaps and injures the child. The brakes in a car fail.’[1]…

    • 3375 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    The ChoicePoint data breach occurred in 2005. This insider data breach brought to light how a company can still be vulnerable to having data stolen from its databases even without any type of hacking of their system. By not properly vetting request for new accounts and request for information led to the theft of over a hundred thousand records of people’s personal information.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Stalk Case Study

    • 562 Words
    • 3 Pages

    Information made from a combination of publicly known elements can be sufficiently secret when its organization is unique and not disclosed to outsiders. George S. May Int'l Co. v. Int'l Profit Associates, 628 N.E.2d 647, 654 (1993); Computer Assocs. Int’l v. Quest Software, Inc., 333 F. Supp. 2d 688 at 700 (stating that a unique combination of software source code could be a trade secret even if it contained publicly known elements). In George, a former employer sought preliminary injunction against former employees from using a unique system of analyzing business operation in another…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Choicepoint Attack

    • 401 Words
    • 2 Pages

    The data theft identified by the various organizations is not uniform. Some of the steps that can be implement by organizations such as:…

    • 401 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Evidence Collection Policy

    • 2535 Words
    • 10 Pages

    Whoever conducts the investigation does so in a previously mandated, official, and legally recognized manner.…

    • 2535 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    One example the author writes about is OnStar. The facts are that OnStar knows the whereabouts and the driving tendencies at any given point of an OnStar-equipped vehicle. What if that information was stolen or given to a third party. Another example is TiVo, where they…

    • 631 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Jarvis, K., & Milletary, J. (2014, January 24). Inside a targeted point-of-sale data breach. Retrieved from http://krebsonsecurity.com/wp-content/uploads/2014/01/Inside-a-Targeted-Point-of-Sale-Data-Breach.pdf…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Xmandroid

    • 14924 Words
    • 60 Pages

    Google Android has become a popular mobile operating system which is increasingly deployed by mobile device manufactures for various platforms. Recent attacks show that Android’s permission framework is vulnerable to applicationlevel privilege escalation attacks, i.e., an application may indirectly gain privileges to perform unauthorized actions. The existing proposals for security extensions to Android’s middleware (e.g., Kirin, Saint, TaintDroid, or QUIRE) cannot fully and adequately mitigate these attacks or detect Trojans such as Soundcomber that exploit covert channels in the Android system. In this paper we present the design and implementation of XManDroid (eXtended Monitoring on Android), a security framework that extends the monitoring mechanism of Android to detect and prevent application-level privilege escalation attacks at runtime based on a systemcentric system policy. Our implementation dynamically analyzes applications’ transitive permission usage while inducing a minimal performance overhead unnoticeable for the user. Depending on system policy…

    • 14924 Words
    • 60 Pages
    Better Essays

Related Topics