Preview

Guilty Agent Detection

Good Essays
Open Document
Open Document
3833 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Guilty Agent Detection
GUILTY AGENT DETECTION USING DATA ALLOCATION STATREGIES

A PROJECT REPORT

Submitted by

JOSEPHINE SHERRINA FERNANDO (31708205050)

S.M.JOY MERCY (31708205051)

In partial fulfillment for the award of the degree of BACHELOR OF TECHNOLOGY

in

INFORMATION TECHNOLOGY
ST. JOSEPH’S COLLEGE OF ENGINEERING, CHENNAI

ANNA UNIVERSITY: CHENNAI 600 025
APRIL 2012 ANNA UNIVERSITY: CHENNAI 600 025 BONAFIDE CERTIFICATE

Certified that this project report “GUILTY AGENT DETECTION USING DATA ALLOCATION STRATEGIES” is the bonafide work of “JOSEPHINE SHERRINA FERNANDO (31708205050) and S.M.JOY MERCY (31708205051)”who carried out the project work under my supervision.

SIGNATURE SIGNATURE

Mrs. G.Lathaselvi M.E.,(Ph.D.) Mrs. J.PADMA
HEAD OF THE DEPARTMENT SUPERVISOR Assistant Professor Assistant Professor
Department Of Information Technology, Department Of Information Technology,
St.Joseph’s College of Engineering St.Joseph’s College of Engineering
Chennai-600 119 Chennai-600 119

Submitted for the Viva-Voce held on _______________

(INTERNAL EXAMINER) (EXTERNAL EXAMINER)

ACKNOWLEDGEMENT

We hereby place on record our deep sense of gratitude and happiness to our beloved chairman Dr.Thiru. Jeppiaar, M.A., B.L.,Ph.D., St. Joseph’s College of Engineering, for the keen interest and affection shown towards us throughout the course.

We take this panorama to extend our hearty thanks to our honorable director
Dr. B. BabuManoharan, M.A., M.B.A., Ph.D., for all his effort in educating me in a premier institution.

We convey our sincere thanks to Dr. Jolly Abraham, M.E., Ph.D., Principal,
St.Joseph’s College of Engineering, for her interest towards us throughout the course.

We extend our hearty thanks to Mrs.G.Lathaselvi, M.E., (Ph.D.), The Head of the Department,for her dauntless support and

You May Also Find These Documents Helpful

  • Good Essays

    Never have I woken up faster than getting a phone call at 1am saying, “I need you STAT to H4104!” Racing from the call room to the Cardiac Intensive Care Unit, I had a million thoughts running through my head. Why is the RN calling me STAT? Is the patient coding? Is the intra-aortic balloon pump I am responsible for not functioning? When I arrive, the patient’s pressures were spiraling downward and the surgeon said he must go back down for surgery. Adrenaline pumping through my veins, I realized this was not an emergency simulation I had been taught – this was real. As soon as we reach the OR, the patient went asystole. Immediately, anesthesia started injecting medications, the OR staff lined up to do compressions and I managed the balloon pump; we…

    • 625 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Workplace Violence

    • 10366 Words
    • 42 Pages

    I would like to thank the faculty for the encouragement and help that they gave me during the course of my studies with the department. A special thanks to my family for their support as I accomplish yet another goal and will undoubtedly move on to others. Last but not least, I thank my examining committee for their time, and especially my committee chair Anna Lukemeyer for the guidance and encouragement she gave me as I worked this project.…

    • 10366 Words
    • 42 Pages
    Powerful Essays
  • Best Essays

    Corporate Espionage

    • 2258 Words
    • 10 Pages

    With the increase in influence of global economies companies have become increasingly knowledge based. As businesses continue to increase their online data storage the ability to keep vast amounts of data online has increased the risk of data leakage and theft. The crime of corporate espionage is a serious threat which has increased along with the integration of technology into business processes. This paper has been written with the objective of providing insight into the crime of corporate espionage including discussion of the problem, offenders and motive, and basic protection measures.…

    • 2258 Words
    • 10 Pages
    Best Essays
  • Good Essays

    These days there are a number of crime shows that air on T.V. Some of the techniques for solving a crime are the same on these shows, but each has a feature that the others do not present in that show. These shows are considered fictional, but some are based on actual events or crimes that have happened. The writer loves to watch these types of shows and attempts to figure out “who did it.” Some people may feel these shows are too vivid or not worth watching, but each one is in some way is different entertainment. The three popular criminal shows are “CSI”, “Law and Order”, and “The Mentalist.” This paper shows how each one gathers evidence and uses it to solve the case in different ways.…

    • 738 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Insider Intelligence

    • 1467 Words
    • 6 Pages

    When one talks about intelligence work in today’s day and age, it is hard to know exactly where to begin. From the humble beginnings of US intelligence in the WWII OSS, the modern intelligence apparatus has ballooned into over a dozen different agencies operating in different fields of concern. However, when asked to identify one the average person will most likely immediately think of the CIA, the big daddy of all intelligence agencies. While each agency has its own area of expertise, and while the CIA has many different forms of intelligence gathering at its disposal, the work it is known for is clandestine operations, which often requires a very specific method of collection; human intelligence. HUMINT as it is called has been the core of…

    • 1467 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Finally, my special thanks to my supervisor Engr, IGE O.A for his love, support and monitoring towards the success of the project. Thank you and God bless.…

    • 7580 Words
    • 31 Pages
    Powerful Essays
  • Good Essays

    It gives me immense pleasure to extend my gratitude to my Head of Department Dr.…

    • 10807 Words
    • 44 Pages
    Good Essays
  • Powerful Essays

    Data Leakage Detection

    • 2271 Words
    • 10 Pages

    proceedings. This model that is being developed will be useful for assessing the “guilt” of agents. Also algorithms are…

    • 2271 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    We would like to express my deep and sincere gratitude to Professor Dr T A S Vijayaraghavan.…

    • 1345 Words
    • 6 Pages
    Satisfactory Essays
  • Better Essays

    I am personally indebted to so many people that a complete acknowledgment would be encyclopedic. My sincere thanks and profound sense of gratitude goes to my respected Chairman, Hon’ble. Dr. Jeppiaar, M.A., B.L., Ph.D., for all his efforts and administration in educating us in premiere institution. I take this opportunity to thank our Director. Dr. Babu Manoharan, M.A., M.B.A., Ph.D. I would like to express my gratitude to our Principal. Dr. Jolly Abraham, M.E., M.I.E., Ph.D., and Head of the Department, Dr. Jayashree Krishnan., B.Sc., M.B.A., Ph.D., for their guidance and advice all through my tenure. I convey my sincere thanks to my guide DR. Vasantha lakshmi M.B.A., Ph.D for her valuable suggestion throughout the project duration. I thank Mr. Ferose sha, Business partner, Motilal Oswal Securities Pvt Ltd For giving me the opportunity to do this project under their esteemed guidance. I also express my thanks to my parents, friends and others who have helped me directly and indirectly towards the successful completion of the project.…

    • 16777 Words
    • 68 Pages
    Better Essays
  • Powerful Essays

    Our sincere thanks to Dr. Ramesh Challagundla, for giving us this great opportunity and for the care and concern he has shown ever since we set foot in the Department of ECE.…

    • 9553 Words
    • 39 Pages
    Powerful Essays
  • Powerful Essays

    Talukder Zaki Jubery and WalidRezanoor Mohammad – it was an enriching and learning experience working with you. I would like to specially thank the faculty and staff of the School of Mechanical and Materials Engineering for all their support and efforts to make my academic life a pleasant and memorable one. Thanks to all my friends for supporting me all through these years. Last but not the least; I would like to thank my father Mani, my mother Vasanthy and my sister Sruthi Raj Kumari for all of their emotional and financial support and for helping me to achieve my goals.…

    • 13815 Words
    • 56 Pages
    Powerful Essays
  • Good Essays

    My Parents Late Prof A.U.Patil, Smt Laxmidevi A.Patil. My Parents-in-law Late Shri Neelkantappa Mugali and Late Smt Ambavou Mugali. To my dear husband Dr.R.N.Mugali. And my son Avinsh.R.Mugali.…

    • 74150 Words
    • 297 Pages
    Good Essays
  • Better Essays

    Data Leakage Detection

    • 2743 Words
    • 11 Pages

    Abstract-A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). If the data distributed to third parties is found in a public/private domain then finding the guilty party is a nontrivial task to distributor. Traditionally, this leakage of data is handled by water marking technique which requires modification of data. If the watermarked copy is found at some unauthorized site then distributor can claim his ownership. To overcome the disadvantages of using watermark [2], data allocation strategies are used to improve the probability of identifying guilty third parties. In this project, we implement and analyze a guilt model that detects the agents using allocation strategies without modifying the original data. The guilty agent is one who leaks a portion of distributed data. The idea is to distribute the data intelligently to agents based on sample data request and explicit data request in order to improve the chance of detecting the guilty agents. The algorithms implemented using fake objects will improve the distributor chance of detecting guilty agents. It is observed that by  minimizing the sum objective the chance of detecting guilty agents will increase. We also developed a framework for generating fake objects.  Keywords - sensitive data; fake objects; data allocation strategies; I. INTRODUCTION In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties. For example, a hospital may give patient records to researchers who will devise new treatments. Similarly, a company may have partnerships with other companies that require sharing customer data. We call owner of the data,…

    • 2743 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    Sustainable Development

    • 1656 Words
    • 7 Pages

    REPUBLIC OF NAMIBIA Official Address by Hon. Dr. Richard Nchabi Kamwi Minister of Health and Social Services On the occasion of the Official launch of the novel “The Other Presence” By Namibia’s Dr. Francis Sifiso Nyathi 27 May 2008 Windhoek 0 Programme Director Madam Inge Zaamwani-Kamwi, President of NCCI Mrs Tangeni Angula, CEO of the Namibia Institute of Pathology Dr. Sifiso Nyathi, the author of the novel “The Other Presence” Esteemed business leaders Distinguished invited guests…

    • 1656 Words
    • 7 Pages
    Powerful Essays

Related Topics