EVALUATE FAKE OBJECTS TO PREDICTS UNAUTHENTICATED DEVELOPERS  

Abstract

Abstract: Modern business activities rely on extensive email exchange. Email leakages have become widespread, and the severe damage caused by such leakages constitutes a disturbing problem for organizations. In this paper we studied the following problem: In the course of doing business, sometimes the data distributor will give sensitive data to trusted third parties. Some of the data is leaked and found in an unauthorized place. The distributor cannot blame the agent without any evidence. Current approaches can detect the hackers but the total number of evidence will be less and the organization may not be able to proceed legally for further proceedings. In this work, we implement and analyze a guilt model that detects the agents using allocation strategies without modifying the original data. Our work identifies the agent who leaked the data with enough evidence. The main focus of this paper is to distribute the sensitive data “intelligently” to agents in order to improve the chances of detecting a guilty agent with strong evidence. The objective of our work is to improve the probability of identifying leakages using Data allocation strategies across the agents and also to identify the guilty party who leaked the data by injecting “realistic but fake” data records.  

Authors and Affiliations

A. Santhi Lakshmi , Prof. C. Rajendra,

Keywords

Related Articles

Performance Analysis of Different Parallel CMOS Adders and Effect of Channel Width at 0.18um 

This paper investigates the designs of various adders implemented using CMOS technology like Full Adder, Carry select Adder, Ripple Carry Adder and Look-Ahead Carry Adder. Simulation is done using Tanner Tool at...

An effective Golden Section Search Approach based Distribution Load Flow

Abstract—This paper presents an effective Golden Section Search approach based Distribution Load Flow (DLF) for planning of distributed generators as PQ and/or PV node. The practical distribution system may have diffe...

Improvising the Infrastructure as a Service Cloud  

The main benefit of IaaS (Infrastructure-as-a-Service clouds) is facilitate the users to retrieve their resources on demand. But, to afford on-demand access, cloud centers must either drastically abundance their...

BER PERFORMANCE OF GMSK USING MATLAB  

— GMSK is most prominent standards around the world. Global System for Mobile communication (GSM), Digital European Cordless Telephone (DECT), Cellular Digital Packet Data (CDPD), Digital communications system in t...

INCREASING RESONANT FREQUENCY OF MICROSTRIP PATCH ANTENNA BY DECREASING THE VALUE OF DIELECTRIC CONSTANT OF SUBSTRATE  

Microstrip patch antenna has some drawbacks of low efficiency, narrow band (<5%), and surface wave losses. In this paper it is shown that we can increase the resonant frequency by decreasing the value of diele...

Download PDF file
  • EP ID EP130987
  • DOI -
  • Views 107
  • Downloads 0

How To Cite

A. Santhi Lakshmi, Prof. C. Rajendra, (2012). EVALUATE FAKE OBJECTS TO PREDICTS UNAUTHENTICATED DEVELOPERS  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(4), 547-551. https://europub.co.uk/articles/-A-130987