International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014

Data Leakage Detection Model for Finding Guilty Agents

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar

The following problem may occur in real world scenario: A data distributor has given sensitive data to a set of trusted agents (third parties or third persons).It may happen that some of the data is leaked and found in an unauthorized place (e.g.; on the web or unauthorized persons laptop). The distributor must assess the probability of specified outcome that the leaked data came from one or more agents. In this paper; we implement methods aimed at improving the odds of detecting such leakages when a distributers sensitive data has been leaked by trustworthy agents and also to possibly identify the agent that leaked the data. By adding fake objects to distributed set; the distributor can find the guilty party.

Keywords: guilty agents, data distributor, data leakage, fake records, leakage detection

Edition: Volume 3 Issue 5, May 2014

Pages: 992 - 994


How to Cite this Article?

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar, "Data Leakage Detection Model for Finding Guilty Agents", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131946, Volume 3 Issue 5, May 2014, 992 - 994

14 PDF Views | 13 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'guilty agents'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 992 - 994

Data Leakage Detection Model for Finding Guilty Agents

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1608 - 1614

Optimizing Data Misuse Detection by Identifying Guilty Agent without Causing Disturbance and Inconvenience to Trusted Agent

Sangramsinh Deshmukh

Share this article

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 199 - 202

Identifying the Data Leaker by Using Sample Data Request Strategy

Lata Dudam, Dr. S. S. Apte

Share this article

Similar Articles with Keyword 'data distributor'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 992 - 994

Data Leakage Detection Model for Finding Guilty Agents

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this article

Similar Articles with Keyword 'data leakage'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 992 - 994

Data Leakage Detection Model for Finding Guilty Agents

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2715 - 2717

Privacy Preserving ANN Over Cloud

Babaso Shinde, Ajay Gupta

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this article

Similar Articles with Keyword 'fake records'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 992 - 994

Data Leakage Detection Model for Finding Guilty Agents

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar

Share this article

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 199 - 202

Identifying the Data Leaker by Using Sample Data Request Strategy

Lata Dudam, Dr. S. S. Apte

Share this article

Similar Articles with Keyword 'leakage detection'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 992 - 994

Data Leakage Detection Model for Finding Guilty Agents

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 695 - 698

Content Leakage Detection by Using Traffic Pattern for Trusted Content Delivery Networks by Comparing Videos of Different Lengths

Motade Vaishali S, Deepak Gupta

Share this article

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 2116 - 2120

Review on Data Leakage Detection & Data Prevention Techniques

Nisha D.Gaikwad, Dr. D S. Bhosle

Share this article

Top