A Model for identifying Guilty Agents in Data Transmission
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Abstract-- This research paper presents a formal method for representing and detecting inconsistencies of combined secrecy models is to detect when the PC distributor’s sensitive data has been leaked by their agents, and if possible to identify the agent that leaked the data. Data leakage is a silent type of threat. This sensitive information can be electronically distributed via e-mail, Web sites, FTP, instant messaging, spreadsheets, databases, and any other electronic means available – all without your knowledge. Data allocation strategies (across the agents) are proposed that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases the distributor can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party. A model for assessing the “guilt” of agents using C# dot net technologies with MS sql server as backend is proposed to develop. Algorithms for distributing objects to agents, in a way that improves our chances of identifying a leaker is aloes presented. Finally, the option of adding “fake” objects to the distributed set is also considered. Such objects do not correspond to real entities but appear.
Authors and Affiliations
Shreyta Raj , , Dr. Ravinder Purwar , Ashutosh Dangwal
Remote Monitoring, Controlling and Lost Hardware Detecting through GSM
The project aims to develop various network utilities which are required to effectively monitor, control via GSM and to provide security to a LAN network. It aims to develop an integrated software solution that allows a...
Implementing Software as a Service in Cloud using Android Applications
The software as a service is provided using android applications. The cloud client is authenticated to get software services from the cloud server. The services include running java applications without installing...
BER PERFORMANCE OF GMSK USING MATLAB
— GMSK is most prominent standards around the world. Global System for Mobile communication (GSM), Digital European Cordless Telephone (DECT), Cellular Digital Packet Data (CDPD), Digital communications system in t...
High Density Salt and Pepper Noise Removal in color and grayscale images Through Modified DBUTMF
In most of the image processing applications, the image denoising is one of the main topic. Corrupted image is called the noisy image, and the corrected is called the de-noised image. We have different types of n...
A Survey on Preserving Privacy towards Location Proof
Location proof of a particular person relies on his/her mobile device position. One of the valuable features of the location proofs tells about accessing the location based services (LBS) by using mobile device. Lo...