ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 5)

Publication Date:

Authors : ;

Page : 283-288

Keywords : data leakage; implicit request; explicit request; steganography; guilty agent; AES algorithm;

Source : Downloadexternal Find it from : Google Scholarexternal


This paper contains the implementation of data leakage detection model’s technology. This paper deals with new technique of research for secured data transmission & leakage detection, if it gets leaked. A data distributor has given sensitive data to the trusted third parties (agents).if some data are leaked and found in an unauthorized place. The distributor must analyze that the leaked data came from (where) one or more agents. We propose data allocation strategies to improve the probability of identifying leakages. We can also add” fake object” to further improve our chances of detecting leakage and identifying the guilty party.

Last modified: 2013-05-21 01:28:33