Data Leakage Detectionusing Distribution Method

Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2014, Vol 4, Issue 1

Abstract

Modern business activities rely on extensive email exchange. Email leakages have become widespread, and the severe damage caused by such leakages constitutes a disturbing problem for organizations. We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). If the data distributed to third parties is found in a public/private domain then finding the guilty party is a nontrivial task to distributor. Traditionally, this leakage of data is handled by water marking technique which requires modification of data. If the watermarked copy is found at some unauthorized site then distributor can claim his ownership. To overcome the disadvantages of using watermark [2], data allocation strategies are used to improve the probability of identifying guilty third parties. The distributor must assess the likelihood that the leaked came from one or more agents, as opposed to having been independently gathered by other means. In this project, we implement and analyze a guilt model that detects the agents using allocation strategies without modifying the original data. The guilty agent is one who leaks a portion of distributed data. We propose data allocation strategies that improve the probability of identifying leakages. In some cases we can also inject “realistic but fake” data record to further improve our changes of detecting leakage and identifying the guilty party. The algorithms implemented using fake objects will improve the distributor chance of detecting guilty agents. It is observed that by minimizing the sum objective the chance of detecting guilty agents will increase. We also developed a framework for generating fake objects.

Authors and Affiliations

Anis Syed

Keywords

Related Articles

 Challenges of Wet Briquetting from Locally Available Biomass

This study aims at solving energy crisis in rural area via fuel briquettes from locally available biomasses by a well proven technique called wet briquetting. This technique has different operational stages of briquette...

 High End Solution for Advanced Civil Engineering Projects

 Civil FEM performs the best customization of the well-known Finite Element Program ANSYS. The combination of both programs, totally integrated, provides the Construction and Civil Engineering fields with the po...

 CFD Analysis of Heat Transfer and Flow Characteristics in A 3D Cubic Enclosure

 Flow arising “naturally” from the effect of density difference, resulting from temperature or concentration difference in a body force field such as gravity, the process is termed as natural convection. There h...

 SOME IMPUTATION METHODS IN DOUBLE SAMPLING SCHEME FOR ESTIMATION OF POPULATION MEAN

 To estimate the population mean with imputation, i.e. the technique of substituting missing data, there are a number of techniques available in literature like Ratio method of imputation, Compromised method of impu...

[u][/u] Fabrication of Human hair and Polypropylene and Evaluaion of Tensile Strength

 Due to increase in population, natural wealth is being exploited to a large extent as an alternative to synthetic materials. Due to this, the use of natural fibres for the reinforcement of the composites has rece...

Download PDF file
  • EP ID EP126131
  • DOI -
  • Views 106
  • Downloads 0

How To Cite

Anis Syed (2014). Data Leakage Detectionusing Distribution Method. International Journal of Modern Engineering Research (IJMER), 4(1), 146-151. https://europub.co.uk/articles/-A-126131