Downloads: 114 | Views: 336
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014 | Popularity: 6.6 / 10
Data Leakage Detection Model for Finding Guilty Agents
J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar
Abstract: The following problem may occur in real world scenario: A data distributor has given sensitive data to a set of trusted agents (third parties or third persons). It may happen that some of the data is leaked and found in an unauthorized place (e. g. ; on the web or unauthorized persons laptop). The distributor must assess the probability of specified outcome that the leaked data came from one or more agents. In this paper; we implement methods aimed at improving the odds of detecting such leakages when a distributers sensitive data has been leaked by trustworthy agents and also to possibly identify the agent that leaked the data. By adding fake objects to distributed set; the distributor can find the guilty party.
Keywords: guilty agents, data distributor, data leakage, fake records, leakage detection
Edition: Volume 3 Issue 5, May 2014
Pages: 992 - 994
Please Disable the Pop-Up Blocker of Web Browser
Verification Code will appear in 2 Seconds ... Wait