Identifying the Data Leaker by Using Sample Data Request Strategy
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 8)Publication Date: 2014-08-05
Authors : Lata Dudam; S. S. Apte;
Page : 199-202
Keywords : Allocation strategies; data leakage; fake object; guilty agent;
Abstract
In course of doing business, sensitive data must be handed over to trusted third parties. The owner of the data is called Distributor and supposedly trusted third parties as the agent. Some of distributors data may be leaked and found at unauthorized place. Our goal is to detect the distributors sensitive data have been leaked by agents and identify the agent who leaked the data. We have used the fake objects which are realistic but fake records, are added to original data, which helps in identifying the guilty agents (the agent who leaked the data). We have used Sample data request allocation strategy for data distribution and we have implemented probability distribution system, to identify the guilty agents and leaked data.
Other Latest Articles
- Combustion Chambers in CI Engines: A Review
- Supply Chain Management Practices and Supply Chain Performance Effectiveness
- Quality of Reproductive and Child Health Care in the Private Sector in India: Issues and Options
- The Application of Ultrasonic Sensor and Atemega 328 Arduino to Measure the Ploughing Depth Elevation of Drainage Channel
- Study of Optimization in Fragmented Item-sets for Business Intelligence
Last modified: 2021-06-30 21:05:59