Downloads: 117 | Views: 126
Research Proposals or Synopsis | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014
Identifying the Data Leaker by Using Sample Data Request Strategy
Lata Dudam | Dr. S. S. Apte [2]
Abstract: In course of doing business, sensitive data must be handed over to trusted third parties. The owner of the data is called Distributor and supposedly trusted third parties as the agent. Some of distributors data may be leaked and found at unauthorized place. Our goal is to detect the distributors sensitive data have been leaked by agents and identify the agent who leaked the data. We have used the fake objects which are realistic but fake records, are added to original data, which helps in identifying the guilty agents (the agent who leaked the data). We have used Sample data request allocation strategy for data distribution and we have implemented probability distribution system, to identify the guilty agents and leaked data.
Keywords: Allocation strategies, data leakage, fake object, guilty agent
Edition: Volume 3 Issue 8, August 2014,
Pages: 199 - 202
Similar Articles with Keyword 'Allocation strategies'
Downloads: 112
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 871 - 876Green Cloud Computing Resource Managing Policies a Survey
Kamiya [3] | Shakti Nagpal [4]
Downloads: 117
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 986 - 989A Novel Algorithm Based on the Change in Entropy Value for Load Balancing in Cluster System
Mitali Mohire | Pratibha Yalagi [2] | Sulabha Apte