A Model for identifying Guilty Agents in Data Transmission  

Abstract

Abstract-- This research paper presents a formal method for representing and detecting inconsistencies of combined secrecy models is to detect when the PC distributor’s sensitive data has been leaked by their agents, and if possible to identify the agent that leaked the data. Data leakage is a silent type of threat. This sensitive information can be electronically distributed via e-mail, Web sites, FTP, instant messaging, spreadsheets, databases, and any other electronic means available – all without your knowledge. Data allocation strategies (across the agents) are proposed that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases the distributor can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party. A model for assessing the “guilt” of agents using C# dot net technologies with MS sql server as backend is proposed to develop. Algorithms for distributing objects to agents, in a way that improves our chances of identifying a leaker is aloes presented. Finally, the option of adding “fake” objects to the distributed set is also considered. Such objects do not correspond to real entities but appear. 

Authors and Affiliations

Shreyta Raj , , Dr. Ravinder Purwar , Ashutosh Dangwal

Keywords

Related Articles

A Survey of Identification of Soybean Crop Diseases  

— In this survey ,we are trying to get a detailed survey of soybean crop and its diseases which are affecting the agriculture of world in a large amount and after collecting all the details we are trying to identif...

 A Review on Energy Efficient Modulation and Coding Techniques for Clustered Wireless Sensor Networks

A standard wireless sensor network comprises of a huge number of sensor nodes with data processing and communication capabilities. The sensor nodes pass the gathered data using radio transmitter, to a sink either...

Frame Differencing with Simulink model for Moving Object Detection 

Visual sensor networks (VSNs) have been attracting more and more research attention nowadays. Identifying moving objects from a video sequence is a fundamental and critical task in many computer-vision application...

A modified Clustering algorithm based on Optimization method. 

This study presents an effective optimization technique such as Ant Colony Optimization (ACO), Particle Swarm Optimization (PCO) and Fuzzy C-Means (FCM) for clustering the dataset. This technique is tested on sever...

Association Rule Mining using Apriori Algorithm: A Survey 

— Association rule mining is the most important technique in the field of data mining. Association rule mining finding frequent patterns, associations, correlations, or causal structures among sets of items or obje...

Download PDF file
  • EP ID EP125872
  • DOI -
  • Views 60
  • Downloads 0

How To Cite

Shreyta Raj, , Dr. Ravinder Purwar, Ashutosh Dangwal (2012). A Model for identifying Guilty Agents in Data Transmission  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(4), 709-713. https://europub.co.uk/articles/-A-125872