A Model for identifying Guilty Agents in Data Transmission
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Abstract-- This research paper presents a formal method for representing and detecting inconsistencies of combined secrecy models is to detect when the PC distributor’s sensitive data has been leaked by their agents, and if possible to identify the agent that leaked the data. Data leakage is a silent type of threat. This sensitive information can be electronically distributed via e-mail, Web sites, FTP, instant messaging, spreadsheets, databases, and any other electronic means available – all without your knowledge. Data allocation strategies (across the agents) are proposed that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases the distributor can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party. A model for assessing the “guilt” of agents using C# dot net technologies with MS sql server as backend is proposed to develop. Algorithms for distributing objects to agents, in a way that improves our chances of identifying a leaker is aloes presented. Finally, the option of adding “fake” objects to the distributed set is also considered. Such objects do not correspond to real entities but appear.
Authors and Affiliations
Shreyta Raj , , Dr. Ravinder Purwar , Ashutosh Dangwal
A Review: Content Base Image Mining Technique for Image Retrieval Using Hybrid Clustering
A SURVEY ON SECURED WATERMARKING TECHNIQUES FOR JPEG IMAGES ON COMPRESSED-ENCRYPTED DOMAIN
In the digital world, the digital media is currently evolving at such a rapid pace, intellectual copyright protection is becoming increasingly important. Now a day, the digital media is available with various image fo...
A Comparative Study On Some New Steganographic Techniques
In this paper, we present some new methods and develop techniques with algorithms for hiding text behind the gray scale image. Steganographic technique allows the sender to communicate information to the receiver w...
Improving Performance of Wireless Mesh Network using Channel Allocation Schemes
One of the major advantages of wireless communication over wired is the flexibility when creating links between nodes. But this comes at a price as influences from outside the mesh network can distort communication be...
Cost Estimation Modal to find faulty Objects in Software Reusable Components
The software development cost can be reduced by reusing the existing components. These exciting components can be the object oriented software components .The object oriented components can be easily reused. Reusing the...