International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 117

Research Proposals or Synopsis | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014


Identifying the Data Leaker by Using Sample Data Request Strategy

Lata Dudam | Dr. S. S. Apte [2]


Abstract: In course of doing business, sensitive data must be handed over to trusted third parties. The owner of the data is called Distributor and supposedly trusted third parties as the agent. Some of distributors data may be leaked and found at unauthorized place. Our goal is to detect the distributors sensitive data have been leaked by agents and identify the agent who leaked the data. We have used the fake objects which are realistic but fake records, are added to original data, which helps in identifying the guilty agents (the agent who leaked the data). We have used Sample data request allocation strategy for data distribution and we have implemented probability distribution system, to identify the guilty agents and leaked data.


Keywords: Allocation strategies, data leakage, fake object, guilty agent


Edition: Volume 3 Issue 8, August 2014,


Pages: 199 - 202


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Lata Dudam, Dr. S. S. Apte, "Identifying the Data Leaker by Using Sample Data Request Strategy", International Journal of Science and Research (IJSR), Volume 3 Issue 8, August 2014, pp. 199-202, https://www.ijsr.net/get_abstract.php?paper_id=30071405

Similar Articles with Keyword 'Allocation strategies'

Downloads: 112

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 871 - 876

Green Cloud Computing Resource Managing Policies a Survey

Kamiya [3] | Shakti Nagpal [4]

Share this Article

Downloads: 117

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 986 - 989

A Novel Algorithm Based on the Change in Entropy Value for Load Balancing in Cluster System

Mitali Mohire | Pratibha Yalagi [2] | Sulabha Apte

Share this Article
Top