A Model for identifying Guilty Agents in Data Transmission  

Abstract

Abstract-- This research paper presents a formal method for representing and detecting inconsistencies of combined secrecy models is to detect when the PC distributor’s sensitive data has been leaked by their agents, and if possible to identify the agent that leaked the data. Data leakage is a silent type of threat. This sensitive information can be electronically distributed via e-mail, Web sites, FTP, instant messaging, spreadsheets, databases, and any other electronic means available – all without your knowledge. Data allocation strategies (across the agents) are proposed that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases the distributor can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party. A model for assessing the “guilt” of agents using C# dot net technologies with MS sql server as backend is proposed to develop. Algorithms for distributing objects to agents, in a way that improves our chances of identifying a leaker is aloes presented. Finally, the option of adding “fake” objects to the distributed set is also considered. Such objects do not correspond to real entities but appear. 

Authors and Affiliations

Shreyta Raj , , Dr. Ravinder Purwar , Ashutosh Dangwal

Keywords

Related Articles

Anomaly Detection and Prevention in Network Traffic based on Statistical approach and α-Stable Model  

Network traffic anomalies plunk for a huge division of the Internet traffic and conciliation the performance of the network resources. Detecting and diagnosing these threats is a protracted and time overriding ta...

DOCUMENT FAXING THROUGH MOBICLOUD USING ANDROID 

This paper discusses about the software which is developed for the Android mobile devices for widely used in the Business fields as well as our day to day life activities. In this era of paperless offices and digit...

 DDS architecture for digital frequency generation

Direct digital synthesizers (DDS) are important components in many digital communication systems[4].DDSs are now available as integrated circuits and their output waveforms up to hundreds of megahertz. Direct digit...

Role of Software Quality Assurance in Capability Maturity Model Integration 

With increasing demand for software products with high „Quality‟, it has become imperative for organizations to adopt quality models like (International Standard Organization) ISO 9001,(Capability Maturity Model Inte...

Download PDF file
  • EP ID EP125872
  • DOI -
  • Views 84
  • Downloads 0

How To Cite

Shreyta Raj, , Dr. Ravinder Purwar, Ashutosh Dangwal (2012). A Model for identifying Guilty Agents in Data Transmission  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(4), 709-713. https://europub.co.uk/articles/-A-125872