Data Leakage Detection Model for Finding Guilty Agents
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 113

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014

Data Leakage Detection Model for Finding Guilty Agents

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar

The following problem may occur in real world scenario: A data distributor has given sensitive data to a set of trusted agents (third parties or third persons). It may happen that some of the data is leaked and found in an unauthorized place (e. g. ; on the web or unauthorized persons laptop). The distributor must assess the probability of specified outcome that the leaked data came from one or more agents. In this paper; we implement methods aimed at improving the odds of detecting such leakages when a distributers sensitive data has been leaked by trustworthy agents and also to possibly identify the agent that leaked the data. By adding fake objects to distributed set; the distributor can find the guilty party.

Keywords: guilty agents, data distributor, data leakage, fake records, leakage detection

Edition: Volume 3 Issue 5, May 2014

Pages: 992 - 994

Share this Article

How to Cite this Article?

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar, "Data Leakage Detection Model for Finding Guilty Agents", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131946, Volume 3 Issue 5, May 2014, 992 - 994

Enter Your Email Address




Similar Articles with Keyword 'guilty agents'

Downloads: 113

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 992 - 994

Data Leakage Detection Model for Finding Guilty Agents

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar

Share this Article

Downloads: 117

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 199 - 202

Identifying the Data Leaker by Using Sample Data Request Strategy

Lata Dudam, Dr. S. S. Apte

Share this Article

Downloads: 129

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1608 - 1614

Optimizing Data Misuse Detection by Identifying Guilty Agent without Causing Disturbance and Inconvenience to Trusted Agent

Sangramsinh Deshmukh

Share this Article

Similar Articles with Keyword 'data distributor'

Downloads: 112

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this Article

Downloads: 113

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 992 - 994

Data Leakage Detection Model for Finding Guilty Agents

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar

Share this Article

Similar Articles with Keyword 'data leakage'

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 8, August 2018

Pages: 1298 - 1301

Prevention and Detection of Sensitive Information Exposure by Advanced Context Based Data Mining Techniques

Shubham Pampattiwar

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2715 - 2717

Privacy Preserving ANN Over Cloud

Babaso Shinde, Ajay Gupta

Share this Article

Downloads: 110

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 972 - 974

A Survey Paper on Data Leak Detection using Semi Honest Provider Framework

Chinar Bhandari, Dr. Srinivas Narasim Kini

Share this Article

Similar Articles with Keyword 'fake records'

Downloads: 113

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 992 - 994

Data Leakage Detection Model for Finding Guilty Agents

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar

Share this Article

Downloads: 117

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 199 - 202

Identifying the Data Leaker by Using Sample Data Request Strategy

Lata Dudam, Dr. S. S. Apte

Share this Article

Similar Articles with Keyword 'leakage detection'

Downloads: 112

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this Article

Downloads: 113

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 992 - 994

Data Leakage Detection Model for Finding Guilty Agents

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar

Share this Article

Downloads: 119

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 2116 - 2120

Review on Data Leakage Detection & Data Prevention Techniques

Nisha D.Gaikwad, Dr. D S. Bhosle

Share this Article

Downloads: 123

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 695 - 698

Content Leakage Detection by Using Traffic Pattern for Trusted Content Delivery Networks by Comparing Videos of Different Lengths

Motade Vaishali S, Deepak Gupta

Share this Article



Top