A Model for identifying Guilty Agents in Data Transmission  

Abstract

Abstract-- This research paper presents a formal method for representing and detecting inconsistencies of combined secrecy models is to detect when the PC distributor’s sensitive data has been leaked by their agents, and if possible to identify the agent that leaked the data. Data leakage is a silent type of threat. This sensitive information can be electronically distributed via e-mail, Web sites, FTP, instant messaging, spreadsheets, databases, and any other electronic means available – all without your knowledge. Data allocation strategies (across the agents) are proposed that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases the distributor can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party. A model for assessing the “guilt” of agents using C# dot net technologies with MS sql server as backend is proposed to develop. Algorithms for distributing objects to agents, in a way that improves our chances of identifying a leaker is aloes presented. Finally, the option of adding “fake” objects to the distributed set is also considered. Such objects do not correspond to real entities but appear. 

Authors and Affiliations

Shreyta Raj , , Dr. Ravinder Purwar , Ashutosh Dangwal

Keywords

Related Articles

A SURVEY ON SECURED WATERMARKING TECHNIQUES FOR JPEG IMAGES ON COMPRESSED-ENCRYPTED DOMAIN

In the digital world, the digital media is currently evolving at such a rapid pace, intellectual copyright protection is becoming increasingly important. Now a day, the digital media is available with various image fo...

A Comparative Study On Some New Steganographic Techniques 

In this paper, we present some new methods and develop techniques with algorithms for hiding text behind the gray scale image. Steganographic technique allows the sender to communicate information to the receiver w...

Improving Performance of Wireless Mesh Network using Channel Allocation Schemes

One of the major advantages of wireless communication over wired is the flexibility when creating links between nodes. But this comes at a price as influences from outside the mesh network can distort communication be...

Cost Estimation Modal to find faulty Objects in Software Reusable Components

The software development cost can be reduced by reusing the existing components. These exciting components can be the object oriented software components .The object oriented components can be easily reused. Reusing the...

Download PDF file
  • EP ID EP125872
  • DOI -
  • Views 83
  • Downloads 0

How To Cite

Shreyta Raj, , Dr. Ravinder Purwar, Ashutosh Dangwal (2012). A Model for identifying Guilty Agents in Data Transmission  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(4), 709-713. https://europub.co.uk/articles/-A-125872