International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Open Access | Double Blind Reviewed

ISSN: 2319-7064


Downloads: 114

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014


Data Leakage Detection Model for Finding Guilty Agents

J.P.Chavan | Ashwini Choutmol | Rahul Shelke | Satish Shelar


Abstract: The following problem may occur in real world scenario: A data distributor has given sensitive data to a set of trusted agents (third parties or third persons). It may happen that some of the data is leaked and found in an unauthorized place (e. g. ; on the web or unauthorized persons laptop). The distributor must assess the probability of specified outcome that the leaked data came from one or more agents. In this paper; we implement methods aimed at improving the odds of detecting such leakages when a distributers sensitive data has been leaked by trustworthy agents and also to possibly identify the agent that leaked the data. By adding fake objects to distributed set; the distributor can find the guilty party.


Keywords: guilty agents, data distributor, data leakage, fake records, leakage detection


Edition: Volume 3 Issue 5, May 2014,


Pages: 992 - 994


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar, "Data Leakage Detection Model for Finding Guilty Agents", International Journal of Science and Research (IJSR), Volume 3 Issue 5, May 2014, pp. 992-994, https://www.ijsr.net/get_abstract.php?paper_id=20131946

Similar Articles with Keyword 'guilty agents'

Downloads: 117

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 199 - 202

Identifying the Data Leaker by Using Sample Data Request Strategy

Lata Dudam | Dr. S. S. Apte [2]

Share this Article

Downloads: 130

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1608 - 1614

Optimizing Data Misuse Detection by Identifying Guilty Agent without Causing Disturbance and Inconvenience to Trusted Agent

Sangramsinh Deshmukh

Share this Article
Top