Malicious Agent Detection In Multi Party Data Access Structure

Abstract

A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some amount of data is leaked and found in an unauthorized machines (e.g., on the internet or computer). The distributor has to findout from whom that data get leaked. We propose data allocation strategies (across the agents) that increase the chances of detecting leakages. These techniques do not need to modify data of the released data (e.g., watermarks). In some cases we can also embed real but fake data records to further increase our chances of detecting leakage and identifying the guilty agent. Our goal is to detect when the distributors sensitive data has been leaked by agents, and detect the agent that leaked the data. Perturbation is a very useful method where the data is modified and made less sensitive before being handed to agents. we develop secure techniques for detecting leakage of a set of objects or records.

Authors and Affiliations

Prof. Devendra Shamkuwar

Keywords

Related Articles

Wrapper Approach for IDS Using Fuzzy Genetic Algorithm

The intrusion detection systems (IDS) are becoming indispensable for effective protection against attacks that are constantly changing in magnitude and complexity. This paper proposes a fuzzy genetic algorithm (FGA) for...

Adoption and Intensification Factors of Rice in Rwanda: A Case of Kirehe District

Ministry of Agriculture and animal resources (MINAGRI) has revamped and rendered several marshlands to farmers for rice cultivation, through a number of high profile agricultural development projects, throughout Rwanda....

Brain Controlled Robotic Vehicle

Independent mobility is core to being able to perform activities of daily living by oneself. A large number of people who are not comfortable with conventional interfaces, due to various machine dysfunctions, like wiring...

Object Detection and Tracking: A Review

We propose a general framework for Object Recognition into regions and objects. In this framework, the detection and recognition of objects proceed simultaneously with image segmentation in a competitive and cooperative...

LONELINESS IS A DISEASE

Feeling of loneliness and being alone were found to be independent predictors of motor decline in old age.[33.[34] It also leads to memory impairment and learning difficulties, and makes the person prone to Alzheimer's d...

Download PDF file
  • EP ID EP220179
  • DOI -
  • Views 156
  • Downloads 0

How To Cite

Prof. Devendra Shamkuwar (2014). Malicious Agent Detection In Multi Party Data Access Structure. International journal of Emerging Trends in Science and Technology, 1(1), 30-35. https://europub.co.uk/articles/-A-220179