A Model for identifying Guilty Agents in Data Transmission  

Abstract

Abstract-- This research paper presents a formal method for representing and detecting inconsistencies of combined secrecy models is to detect when the PC distributor’s sensitive data has been leaked by their agents, and if possible to identify the agent that leaked the data. Data leakage is a silent type of threat. This sensitive information can be electronically distributed via e-mail, Web sites, FTP, instant messaging, spreadsheets, databases, and any other electronic means available – all without your knowledge. Data allocation strategies (across the agents) are proposed that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases the distributor can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party. A model for assessing the “guilt” of agents using C# dot net technologies with MS sql server as backend is proposed to develop. Algorithms for distributing objects to agents, in a way that improves our chances of identifying a leaker is aloes presented. Finally, the option of adding “fake” objects to the distributed set is also considered. Such objects do not correspond to real entities but appear. 

Authors and Affiliations

Shreyta Raj , , Dr. Ravinder Purwar , Ashutosh Dangwal

Keywords

Related Articles

TO IMPROVE BIT ERROR RATE OF OFDM TRANSMISSION USING TURBO CODES  

This review paper deals with the concept of Turbo coded OFDM (Orthogonal frequency division multiplexing) which improves the system throughput. Orthogonal frequency division multiplexing is a popular modulation met...

E-Commerce Applications: Vulnerabilities, Attacks and Countermeasures 

The extensive use of e-commerce creates new ways for both image and brands to be attacked. Attackers using various gimmicks and techniques to find various loopholes in the system. While there has been good ways to id...

Design of a Cost Effective and environment friendly Off-Grid Wind-Diesel Hybrid Power System in Kutubdia Island of Bangladesh 

This paper presents the Design of a cost effective andenvironment friendlyoff-grid wind-diesel hybrid power system in a grid isolated island, kutubdia, Bangladesh.Wind power is the clean source of renewable and fr...

A Multimodal Biometric System Using Fingerprint and Face 

— Biometric identification system, which uses physical or behavioral features to check a person’s identity, ensures much greater security than passwords and number systems. Biometric features such as face or finger...

Estimation of Solar Cell Model Parameter by Hybrid Genetic Algorithm Using MATLAB  

In the present work, an efficient and accurate approach for the estimation of the solar cell parameters using hybrid genetic algorithm from the given voltage-Current data is proposed. Exact estimation of solar ce...

Download PDF file
  • EP ID EP125872
  • DOI -
  • Views 80
  • Downloads 0

How To Cite

Shreyta Raj, , Dr. Ravinder Purwar, Ashutosh Dangwal (2012). A Model for identifying Guilty Agents in Data Transmission  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(4), 709-713. https://europub.co.uk/articles/-A-125872