A Model for identifying Guilty Agents in Data Transmission  

Abstract

Abstract-- This research paper presents a formal method for representing and detecting inconsistencies of combined secrecy models is to detect when the PC distributor’s sensitive data has been leaked by their agents, and if possible to identify the agent that leaked the data. Data leakage is a silent type of threat. This sensitive information can be electronically distributed via e-mail, Web sites, FTP, instant messaging, spreadsheets, databases, and any other electronic means available – all without your knowledge. Data allocation strategies (across the agents) are proposed that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases the distributor can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party. A model for assessing the “guilt” of agents using C# dot net technologies with MS sql server as backend is proposed to develop. Algorithms for distributing objects to agents, in a way that improves our chances of identifying a leaker is aloes presented. Finally, the option of adding “fake” objects to the distributed set is also considered. Such objects do not correspond to real entities but appear. 

Authors and Affiliations

Shreyta Raj , , Dr. Ravinder Purwar , Ashutosh Dangwal

Keywords

Related Articles

A Scalable Privacy-Preserving Verification Correctness Protocol to Identify Corrupted Data in Cloud Storage

Cloud computing prevails over the whole world which makes the mankind to rely more on a number of online storage systems to back up data or for using it in real time which gives an anywhere, anytime access. Thus lot o...

Data mining with Improved and efficient mechanism to detect the Vulnerabilities using intrusion detection system 

Intrusion detection system must be capable of known and unknown vulnerabilities. We already studied the previous problems which includes detection of known vulnerabilities and unknown vulnerabilities. In order to obtai...

ROBUST AND FLEXIBLE IP ADDRESSING FOR MOBILE AD-HOC NETWORK 

Mobile Ad hoc Networks (MANETs) are expected to become more and more important in the upcoming years. In order to enable the establishment of IP services in MANets, IP address auto configuration mechanisms are re...

A Combined Approach to Part-of-Speech Tagging Using Features Extraction and Hidden Markov Model 

Words are characterized by its features. In an inflectional language, category of a word can be express by its tense, aspect and modality (TAM). Extracting features from an inflected word, one can categorised it wi...

Download PDF file
  • EP ID EP125872
  • DOI -
  • Views 85
  • Downloads 0

How To Cite

Shreyta Raj, , Dr. Ravinder Purwar, Ashutosh Dangwal (2012). A Model for identifying Guilty Agents in Data Transmission  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(4), 709-713. https://europub.co.uk/articles/-A-125872