Data Leakage Detectionusing Distribution Method

Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2014, Vol 4, Issue 1

Abstract

Modern business activities rely on extensive email exchange. Email leakages have become widespread, and the severe damage caused by such leakages constitutes a disturbing problem for organizations. We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). If the data distributed to third parties is found in a public/private domain then finding the guilty party is a nontrivial task to distributor. Traditionally, this leakage of data is handled by water marking technique which requires modification of data. If the watermarked copy is found at some unauthorized site then distributor can claim his ownership. To overcome the disadvantages of using watermark [2], data allocation strategies are used to improve the probability of identifying guilty third parties. The distributor must assess the likelihood that the leaked came from one or more agents, as opposed to having been independently gathered by other means. In this project, we implement and analyze a guilt model that detects the agents using allocation strategies without modifying the original data. The guilty agent is one who leaks a portion of distributed data. We propose data allocation strategies that improve the probability of identifying leakages. In some cases we can also inject “realistic but fake” data record to further improve our changes of detecting leakage and identifying the guilty party. The algorithms implemented using fake objects will improve the distributor chance of detecting guilty agents. It is observed that by minimizing the sum objective the chance of detecting guilty agents will increase. We also developed a framework for generating fake objects.

Authors and Affiliations

Anis Syed

Keywords

Related Articles

PV/Diesel Hybrid System for Fuel Production from Waste Plastics Recycling

The treatment of wastes has become one of the most important concerns of modern society. Converting waste plastic into gasoline and diesel fuel through a highly effective low-cost pyrolysis process is a promising te...

An Enhance PSO Based Approach for Solving Economical Ordered Quantity (EOQ) Problem

The Meta-heuristic approaches can provide a sufficiently good solution to an optimization problem, especially with incomplete or imperfect information and with lower computational complexity especially for nume...

A Review of Routing Protocols for Wireless Sensor Network

A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability, may contain multiple types of memory, have a RF transceiver, have a power source, and...

 Methods of Research into Privacy in Housing

 Abstract: Systematic research through residents' attitudes, preferences, etc. in dwellings has become the dominant mode of environmental research into building design. Most of these works have been directed at the...

Value Chain Bankrolling: Strategy towards enhancing growth in Agriculture sector in India

Value chain has been an important concept in management offering improvement over the traditional supply or distribution chain, with an aim to optimize the chain and reduce it to limited links with each one per...

Download PDF file
  • EP ID EP126131
  • DOI -
  • Views 94
  • Downloads 0

How To Cite

Anis Syed (2014). Data Leakage Detectionusing Distribution Method. International Journal of Modern Engineering Research (IJMER), 4(1), 146-151. https://europub.co.uk/articles/-A-126131