Downloads: 114
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014
Data Leakage Detection Model for Finding Guilty Agents
J.P.Chavan | Ashwini Choutmol | Rahul Shelke | Satish Shelar
Abstract: The following problem may occur in real world scenario: A data distributor has given sensitive data to a set of trusted agents (third parties or third persons). It may happen that some of the data is leaked and found in an unauthorized place (e. g. ; on the web or unauthorized persons laptop). The distributor must assess the probability of specified outcome that the leaked data came from one or more agents. In this paper; we implement methods aimed at improving the odds of detecting such leakages when a distributers sensitive data has been leaked by trustworthy agents and also to possibly identify the agent that leaked the data. By adding fake objects to distributed set; the distributor can find the guilty party.
Keywords: guilty agents, data distributor, data leakage, fake records, leakage detection
Edition: Volume 3 Issue 5, May 2014,
Pages: 992 - 994
Similar Articles with Keyword 'guilty agents'
Downloads: 117
Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 199 - 202Identifying the Data Leaker by Using Sample Data Request Strategy
Lata Dudam | Dr. S. S. Apte [2]
Downloads: 130
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1608 - 1614Optimizing Data Misuse Detection by Identifying Guilty Agent without Causing Disturbance and Inconvenience to Trusted Agent
Sangramsinh Deshmukh