Downloads: 114 | Views: 282
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014 | Popularity: 6.6 / 10
Data Leakage Detection Model for Finding Guilty Agents
J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar
Abstract: The following problem may occur in real world scenario: A data distributor has given sensitive data to a set of trusted agents (third parties or third persons). It may happen that some of the data is leaked and found in an unauthorized place (e. g. ; on the web or unauthorized persons laptop). The distributor must assess the probability of specified outcome that the leaked data came from one or more agents. In this paper; we implement methods aimed at improving the odds of detecting such leakages when a distributers sensitive data has been leaked by trustworthy agents and also to possibly identify the agent that leaked the data. By adding fake objects to distributed set; the distributor can find the guilty party.
Keywords: guilty agents, data distributor, data leakage, fake records, leakage detection
Edition: Volume 3 Issue 5, May 2014
Pages: 992 - 994
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 101
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1752 - 1755SNPDAC: Secure Network Protocol with Data Access Controlling in WSN
Uttarkar Amit Ratikant, Hingoliwala H. A.
Downloads: 106
Research Paper, Computer Science & Engineering, India, Volume 7 Issue 8, August 2018
Pages: 1298 - 1301Prevention and Detection of Sensitive Information Exposure by Advanced Context Based Data Mining Techniques
Shubham Pampattiwar
Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1303 - 1306Survey on Privacy Preservation of Sensitive Data
Uma Ashok Huljanti, Dr. Srinivas Narasim Kini
Downloads: 108
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2715 - 2717Privacy Preserving ANN Over Cloud
Babaso Shinde, Ajay Gupta
Downloads: 113
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1087 - 1088A Survey on the Various Techniques of Data Leakage Detection
Saranya S. Devan, Minu Lalitha Madhavu