DATA LEAKAGE DETECTION?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 5)Publication Date: 2013-05-15
Authors : N. Bangar Anjali P. Rokade Geetanjali Patil Shivlila R. Shetkar Swati N B Kadu;
Page : 283-288
Keywords : data leakage; implicit request; explicit request; steganography; guilty agent; AES algorithm;
Abstract
This paper contains the implementation of data leakage detection model’s technology. This paper deals with new technique of research for secured data transmission & leakage detection, if it gets leaked. A data distributor has given sensitive data to the trusted third parties (agents).if some data are leaked and found in an unauthorized place. The distributor must analyze that the leaked data came from (where) one or more agents. We propose data allocation strategies to improve the probability of identifying leakages. We can also add” fake object” to further improve our chances of detecting leakage and identifying the guilty party.
Other Latest Articles
- Development of engineering students' foreign language competence via authors’ e-learning courses
- Evaluation of the effectiveness of employee`s performance system case study: Saderat Bank-East Azerbaijan branch
- The relationship between evaluation criteria and economic value added among accepted companies in Tehran Stock Exchange
- The impact of authoritative, permissive and authoritarian behavior of parents on self-concept, psychological health and life quality
- An Evaluation of the Direct Instruction Model-Lead-Test Procedure and Rewards on Rote Counting, Number Recognition and Rational Counting with a Preschool Student with Developmental Delays
Last modified: 2013-05-21 01:28:33