A Model for identifying Guilty Agents in Data Transmission
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Abstract-- This research paper presents a formal method for representing and detecting inconsistencies of combined secrecy models is to detect when the PC distributor’s sensitive data has been leaked by their agents, and if possible to identify the agent that leaked the data. Data leakage is a silent type of threat. This sensitive information can be electronically distributed via e-mail, Web sites, FTP, instant messaging, spreadsheets, databases, and any other electronic means available – all without your knowledge. Data allocation strategies (across the agents) are proposed that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases the distributor can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party. A model for assessing the “guilt” of agents using C# dot net technologies with MS sql server as backend is proposed to develop. Algorithms for distributing objects to agents, in a way that improves our chances of identifying a leaker is aloes presented. Finally, the option of adding “fake” objects to the distributed set is also considered. Such objects do not correspond to real entities but appear.
Authors and Affiliations
Shreyta Raj , , Dr. Ravinder Purwar , Ashutosh Dangwal
A Survey of Identification of Soybean Crop Diseases
— In this survey ,we are trying to get a detailed survey of soybean crop and its diseases which are affecting the agriculture of world in a large amount and after collecting all the details we are trying to identif...
A Review on Energy Efficient Modulation and Coding Techniques for Clustered Wireless Sensor Networks
A standard wireless sensor network comprises of a huge number of sensor nodes with data processing and communication capabilities. The sensor nodes pass the gathered data using radio transmitter, to a sink either...
Frame Differencing with Simulink model for Moving Object Detection
Visual sensor networks (VSNs) have been attracting more and more research attention nowadays. Identifying moving objects from a video sequence is a fundamental and critical task in many computer-vision application...
A modified Clustering algorithm based on Optimization method.
This study presents an effective optimization technique such as Ant Colony Optimization (ACO), Particle Swarm Optimization (PCO) and Fuzzy C-Means (FCM) for clustering the dataset. This technique is tested on sever...
Association Rule Mining using Apriori Algorithm: A Survey
— Association rule mining is the most important technique in the field of data mining. Association rule mining finding frequent patterns, associations, correlations, or causal structures among sets of items or obje...