Abstract:
Data leaking issues are addressed by this project: Consider a data sender who sends confidential data to third parties. Attackers accidently or intentionally leak sensitive data and download it to their terminals.
The distributor must investigate whether the compromised data came from one or more of his counterparts. Our approach provides counterpart-based data allocation strategies to improve data leak detection.
These approaches do not require parity changes to conveyed data. We can also introduce “realistic but fake” data records into the data stream to boost our chances of finding unknown data leaks and their perpetrators.
Note: Please discuss with our team before submitting this abstract to the college. This Abstract or Synopsis varies based on student project requirements.
Did you like this final year project?
To download this project Code with thesis report and project training... Click Here