Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
34 views28 pages

Blockchain for Data Leakage Prevention

Uploaded by

Riyaz Reheart
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views28 pages

Blockchain for Data Leakage Prevention

Uploaded by

Riyaz Reheart
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

PROJECT PHASE I – MODEL REVIEW

Improved data leakage prevention using


Blockchain

PROJECT STUDENTS GUIDE


M. Riyaz khan-41613014 Dr. Geethanjali.D
G. Jeevan Sai Krishna Reddy-41613008
Assistant Professor, CSE

December 1, 2024 School of Computing - CSE- BCT 1


AGENDA
• Overview
• Objective
• Literature Survey
• Inferences from Literature Survey
• Problem Description
• Proposed System
– Overall Architecture
– Work Flow
– Methodology / Algorithm used
• Conclusion
• References

December 1, 2024 School of Computing - CSE- BCT 2


Overview
Data leakage is the big challenge in front of the industries & different institutes. Though
there are number of systems designed for the data security by using different encryption
algorithms, there is a big issue of the integrity of the users of those systems. It is very
hard for any system administrator to trace out the data leaker among the system users. It
creates a lot many ethical issues in the working environment of the office. Data leakage
detection techniques are built for users to track if data has been leaked and the trace the
sources of data leakage. Many times, we come across cases where leaked data is found at
unauthorized places. For example, we may find sensitive data stored on an unauthorized
laptop or website. At such a time it becomes important to trace the source of data
leakage. For this purpose, we propose an improved data leakage detection technique to
trace back sources of unauthorized leakage by using a strategy of data allocation across
various agents.
December 1, 2024 School of Computing - CSE- BCT 3
Cont..
• The strategy allows user to transfer data to users by considering receivers as agents
who are allocated data along with some id based undetectable alterations. These
alterations allow our system to trace back the source of leaked data as soon as it is
found on any unauthorized sources. In this system we propose to identify data
leakages by storing data as per agents. Our system is designed for detection of data
in (.txt,.jpg &.bmp) formats.

December 1, 2024 School of Computing - CSE- BCT 4


OBJECTIVE
 An objective for improved data leakage prevention (DLP) typically aims to

safeguard sensitive information from unauthorized access, disclosure, or theft.

 Enhance organizational data leakage prevention by implementing advanced

hashing algorithms to ensure the integrity and confidentiality of sensitive

information.

 By leveraging a range of hashing algorithms, the organization aims to secure data

integrity, reduce the risk of data breaches, and ensure compliance with industry

standards and regulations.

December 1, 2024 School of Computing - CSE- BCT 5


LITERATURE SURVEY
[1] A. Jaiswal, V. Purohit, V. Jhawar, Y. Jadhav and K. Borhade, "Secure-e-Share: Data
leakage Detection and Prevention with Secured Cloud Storage," 2023 IEEE International
Students' Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal,
India, 2023, pp. 1-5, doi: 10.1109/SCEECS57921.2023.10063119.

[2] A. Kozachok, A. Spirin, V. Kozachok and D. Lavrova, "Information leakage prevention


based on the separation of encrypted and compressed data," 2021 Ivannikov Ispras Open
Conference (ISPRAS), Moscow, Russian Federation, 2021, pp. 26-29, doi:
10.1109/ISPRAS53967.2021.00009.

[3] B. Hauer, "Data and Information Leakage Prevention Within the Scope of Information
Security," in IEEE Access, vol. 3, pp. 2554-2565, 2015, doi: 10.1109/ACCESS.2015.2506185.

December 1, 2024 School of Computing - CSE- BCT 6


LITERATURE SURVEY
[4]B. S. Shishodia and M. J. Nene, "Data Leakage Prevention System for Internal
Security," 2022 International Conference on Futuristic Technologies (INCOFT), Belgaum,
India, 2022, pp. 1-6, doi: 10.1109/INCOFT55651.2022.10094509.

[5] E. G. Agrawal and D. S. J. Goyal, "Survey on Data Leakage Prevention through Machine
Learning Algorithms," 2022 International Mobile and Embedded Technology Conference
(MECON), Noida, India, 2022, pp. 121-123, doi: 10.1109/MECON53876.2022.9752047.

[6] K. W. Kongsgard, N. A. Nordbotten, F. Mancini, R. Haakseth and P. E. Engelstad, "Data


Leakage Prevention for Secure Cross-Domain Information Exchange," in IEEE
Communications Magazine, vol. 55, no. 10, pp. 37-43, Oct. 2017, doi:
10.1109/MCOM.2017.1700235.

December 1, 2024 School of Computing - CSE- BCT 7


[.
LITERATURE SURVEY
[7]M. E. Moudni and E. Ziyati, "Data Leakage Prevention Approach Based On Insider Trust
Calculation," 2023 10th International Conference on Wireless Networks and Mobile
Communications (WINCOM), Istanbul, Turkiye, 2023, pp. 1-6, doi:
10.1109/WINCOM59760.2023.10322935.

[8] S. Peneti and B. P. Rani, "Data leakage prevention system with time stamp," 2016
International Conference on InformationCommunication and Embedded Systems (ICICES),
Chennai, India, 2016, pp. 1-4, doi: 10.1109/ICICES.2016.7518934.

[9] S. V, L. S. P, N. K. P, L. P. V and B. S. CH, "Data Leakage Detection and Prevention Using


Cipher text-Policy Attribute Based Encryption Algorithm," 2024 11th International
Conference on Reliability, (Trends and Future Directions) (ICRITO), Noida, India, 2024, pp. 1-
5, doi: 10.1109/ICRITO61523.2024.10522194

December 1, 2024 School of Computing - CSE- BCT 8


LITERATURE SURVEY
[10] V. Bucur, O. Stan and L. C. Miclea, "Data Loss Prevention and Data Protection in Cloud
Environments Based on Authentication Tokens," 2019 22nd International Conference on
Control Systems and Computer Science (CSCS), Bucharest, Romania, 2019, pp. 720-725, doi:
10.1109/CSCS.2019.00128

December 1, 2024 School of Computing - CSE- BCT 9


INFERENCES FROM LITERATURE SURVEY
Author & Journal
Title Existing techniques Drawbacks
name

Collection, defining, reduction, Resource-intensive and time-


1. E. G. Agrawal and D. S. J. Survey on Data Leakage storage, classification,
Goyal, 2022 International Prevention through analytics, and protection. consuming, requiring continuous
Mobile and Embedded Machine Learning monitoring and updates for machine
Technology Conference Algorithms learning models, potentially
(MECON), Noida, India. introducing latency, and being
complex and costly to integrate with
existing systems and ensure regulatory
compliance.

2. S. V, L. S. P, N. K. P, L. P. V Data Leakage Detection This paper develops into the


and B. S. CH, 2024 11th Computational complexity, which can
and Prevention Using utilization of CP-ABE for data lead to increased latency in
International Conference on Cipher text-Policy leak prevention and detection,
Reliability, Info com encryption and decryption processes,
Attribute Based explains how this cryptographic making it less efficient for real-time
Technologies and Encryption Algorithm
Optimization (Trends and technique restricts access solely applications. Scalability is another
Future Directions) (ICRITO), for authorized individuals concern, as the system's performance
Noida, India. possessing requisite attributes. can degrade as the number of users
and attributes grows.

December 1, 2024 School of Computing - CSE- BCT 10


INFERENCES FROM LITERATURE SURVEY
Author & Journal
Title Existing techniques Drawbacks
name
3. A. Jaiswal, V. Purohit, V. The additional step of requesting and
Jhawar, Y. Jadhav and K. granting permission can be seen as
Borhade, 2023 IEEE redundant by some users, potentially
International Students' affecting the user experience.
Conference on Electrical, user-centered design approach,
Moreover, the reliance on a secure
Electronics and Computer Secure-e-Share: Data focusing on the needs and
Science (SCEECS), Bhopal, communication channel for sending
leakage Detection and behaviors of our target
India. Prevention with verification codes adds a layer of
audience. Security measures are
Secured Cloud Storage complexity.
implemented through
encryption, permission-based
access, and notification
systems.

Daria Lavrova Peter the Great Performance Overhead:


St.Petersburg Polytechnic Information leakage Complexity of Implementation:
University(SPbPU) ORCID prevention based on the Separationo f Encrypted and
Handling of Encrypted Content:
0000-0003-2849-4682 separation of encrypted Compressed Data:
False Positives and False Negatives:
and compressed data Decryption and Decompression:
Limited Effectiveness Against
Scanning and Policy
Advanced Threats:
Enforcement:
Privacy and Data Integrity Concerns:
Delivery or Storage:
Compatibility and Interoperability
Issues:

December 1, 2024 School of Computing - CSE- BCT 11


INFERENCES FROM LITERATURE SURVEY
Author & Journal
Title Existing techniques Drawbacks
name

Data Identification and Complexity and Cost


Subhashini Peneti Research Classification Performance Impact
scholar, Computer Science Data Monitoring Resource Intensive
Engineering, JNTUH Policy Enforcement Scalability Issues
Hyderabad, Telangana 500 Data Leakage Incident Detection and Privacy Concerns
085 Prevention System with Response Employee Monitoring
Time Stamp Audit and Reporting

BARBARA HAUER Network-Based DLP Systems False Positives and Negatives


Johannes Kepler Data and Information
Leakage Prevention Cloud-Based DLP Systems Complexity and Resource Intensive
University Linz, Linz Within the Scope of Email-Based DLP Systems User Frustration
4040, Austria Information Security Database Activity Monitoring Cost
Corresponding author: B. (DAM) privacy concerns
Hauer)

December 1, 2024 School of Computing - CSE- BCT 12


INFERENCES FROM LITERATURE SURVEY
Author & Journal
Title Existing techniques Drawbacks
name
Complexity of Implementation
Content Filtering and
Performance Impact
Inspection
K. W. Kongsgard, N. A. False Positives and Negatives
Policy-Based Controls
Nordbotten, F. Mancini, R. Privacy Concerns
Encryption and Tokenization.
Haakseth and P. E. Engelstad, Policy Management
Data Leakage Network Security Measures
in IEEE Communications Behavioral Analytics
Prevention for Secure
Magazine, vol. 55, no. 10, pp. Cross-Domain Audit and Monitoring
37-43, Oct. 2017 Information Exchange

Complexity of Management
Data Loss Prevention Data Visibility
V. Bucur, O. Stan and L. C. Security Risks
and Data Protection in Data Protection Techniques
Miclea, 2019 22nd User Experience4.
Cloud Environments Using Authentication Tokens
Performance Overhead
International Conference Based on Authentication Token-Based Authentication
Cost Considerations
on Control Systems and Tokens and Access Control
Implementation Costs
Computer Science Encryption and Tokenization
(CSCS), Bucharest, Data Masking and
Romania, 2019 Anonymization

December 1, 2024 School of Computing - CSE- BCT 13


INFERENCES FROM LITERATURE SURVEY
Author & Journal
Title Existing techniques Drawbacks
name
Mohammed EL MOUDNI Behavioral Analytics:
C3S-ESTC / CED-ENSEM User Behavior Monitoring:
Accuracy of Trust Metrics:
Hassan II University Insider Trust Calculation:
Data Leakage Complexity and Implementation
Casablanca, Morocco 2023 Trust Metrics:
Prevention Approach Challenges:
10th International Contextual Awareness:
Based On Insider Trust Behavioral Variability and Contextual
Conference Access Controls and Privilege
Calculation Challenges:
Management:
Privacy Concerns and User :
Dynamic Access Controls:

Perwej, Dr. Yusuf & Data Leakage


Content Discovery and
Prevention System for Complexity and Implementation
Abbas, Qamar & Dixit, Internal Security
Classification
Challenges
Jai & Akhtar, Nikhat & Endpoint Protection
False Positives and False Negatives
Jaiswal, Anurag. (2021). Network Monitoring and
Impact on User Productivity:
Filtering
Adaptability to Evolving Threats:
Encryption and Tokenization

December 1, 2024 School of Computing - CSE- BCT 14


PROBLEM DESCRIPTION

o A data leak is when sensitive data is accidentally exposed physically, on the Internet or any
other form including lost hard drives or laptops. This means a cyber-criminal can gain
unauthorized access to the sensitive data without effort.

o If a cybercriminal identifies a data leak, the exposed data could be used to strategize a
successful cyberattack. So, by detecting and remediating data leaks before they are
discovered, the risk of data breaches is significantly reduced.

o The worst part is once a data exposure has happened, it is extremely difficult to know
whether the data was accessed. This means that your confidential data, trade secrets,
source code, customer data, personal data and anything else stored on information systems
could be exposed or used as part of corporate spying.
o
December 1, 2024 School of Computing - CSE- AIML DS AI 15
o Data leaks are caused by simple errors but those whose data is exposed don't care
about how the data was exposed only that it was.

o The breach notification requirements for data leaks are the same, as is the potential
for reputational, financial, legal and regulatory damage.

December 1, 2024 School of Computing - CSE- BCT 16


PROPOSED SYSTEM

 We have learned about various algorithms, their benefits and drawbacks, to


prevent data leakage from the Research Papers we read. We also investigated
how to combine those algorithms in an effective and efficient manner, making it
nearly impossible for any attacker to intrude and view the actual data. We came
across some major algorithms which we can be implement in this project such
as,
• Triple DES algorithm
• RSA algorithm
• AES algorithm
• Blowfish algorithm.

December 1, 2024 School of Computing - CSE- BCT 17


PROPOSED SYSTEM

Advantages of Proposed System


 Detection of guilty agent.

 Send message or email to the distributor with identification of guilty agent.

 Send alert message to the guilty agent.

 Take legal action on agent when he/she break rule after the alert message

December 1, 2024 School of Computing - CSE- BCT 18


System Architecture

December 1, 2024 School of Computing - CSE- BCT 19


December 1, 2024 School of Computing - CSE- BCT 20
Work Flow

December 1, 2024 School of Computing - CSE- BCT 21


Cont..

Methodology/Algorithm Used
Language used java :

JVM plays a vital role to provide security. It verifies the byte-code. The
JVM provides guarantees that there is no unsafe operation going to execute. It also
helps to diminish the possibilities of the programmers who suffer from memory safety
flaws. Java class libraries provide several API that leads to security. These APIs contain
cryptographic algorithms and authentication protocols that lead to secure
communication.

JVM Environment used:

NetBeans is coded in Java and runs on most operating systems with a Java
Virtual Machine (JVM), including Solaris, Mac OS, and Linux.

December 1, 2024 School of Computing - CSE- BCT 22


NetBeans manages the following platform features and components:
• User settings
• Windows (placement, appearance, etc.) NetBeans
• Visual Library
• Storage
• Integrated development tools
• Framework wizard

December 1, 2024 School of Computing - CSE- BCT 23


Algorithms used:

• 1. AES algorithm
• 2. Triple DES algorithm
• 3. Blowfish algorithm
• 4. RSA algorithm
• 5. Hybridizer
• 6. Main Module (UI & Integration – Encryption & Decryption)

December 1, 2024 School of Computing - CSE- BCT 24


CONCLUSION

• As you can see from the snapshots of the implementation, multiple stages
of encryption are used. These are shown only for the purpose of the
demonstration. During real time execution, these output messages will not
be displayed and only the final encrypted text will be given. This seals any
possibility for the hacker to find out the number of algorithms used also. This
System can be used by Companies to store their highly confidential data.
Their data remains highly safe from any form of attack.

December 1, 2024 School of Computing - CSE- BCT 25


REFERENCES
• [1] Ezekiel Bala, Ajibola Aminat, Ebelogu Christopher U "Hybrid Data Encryption
and Decryption Using RSA And RC4”
• [2] R. Latha, R.Vinothini "Secure Communication Using Hybrid Cryptosystem”
• [3]Neetha Francis, Thomas Monoth. "An Analysis of Hybrid Cryptographic
Approaches for Information Security”
• [4] Radwan Tahboub --Palestine Polytechnic University Yousef Saleh --Palestine
Polytechnic University "Data Leakage/Loss Prevention Systems (DLP)”
• [5] R. Latha, R.Vinothini "Secure Communication Using Hybrid Cryptosystem”
• [6] R Rahmadani, T T A Putri, S Sriadhi, "Data security system using hybrid
cryptosystem RC4A-RSA algorithm”
• [7] Shivakumara Tuppada --BMS Institute of Technology and Management
Muneshwar M M S --BMS Institute of Technology "Dynamic Mechanisms of Data
Leakage Detection and Prevention”
• [8] Shraddha A. Mankar Snehal S. Mandhare Siddhi N. More Rashmi R. Patil
"Enhancement of Data leakage detection using Encryption Techniques”
• [9] V.Krishna Reddy, A.Devi Chandana, E.Sri Pujitha, M.Pranitha Shravani "An
Efficient and Secured Data Loss Prevention using Hybrid Cryptosystem for Secure
Data Storage”
December 1, 2024 School of Computing - CSE- BCT 26
REFERENCES
• [10] Yange Chen, Hequn Liu, Baocang Wang "A threshold hybrid encryption
method for integrity audit without trusted centre”

December 1, 2024 School of Computing - CSE- BCT 27


THANK YOU

We thank God, Our Department, Guide, Panel Members,


Supportive Professors and all Technical and non Technical
staff who helped us in our Project.

December 1, 2024 School of Computing - CSE- BCT 28

You might also like