A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 12, Issue 3

Abstract

 In organizations sensitive data transaction is having less security because there may be a misusability of data from one to other from past years. In previous methods they calculated how much data is  leaked but didn’t find who is leaked. In this paper, we find leakage and leaker. A data distributor has given  sensitive data to a set of supposedly trusted agents (third parties). Some of the data has leaked and found in an  unauthorized place (e.g., on the web or somebody’s laptop). The distributor should assess the likelihood of the   leaked data came from one or more agents, as opposed to having independently gathered by others. We propose  data allocation strategies (across the agents) that improve the probability of identifying leakages. These  methods don’t rely on alterations of the released data (e.g., watermarks). In some cases we can also inject  “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party.

Authors and Affiliations

B. Sruthi Patel

Keywords

Related Articles

 Resource-Diversity Tolerant: Resource Allocation in the Cloud Infrastructure Services

Abstract: The cloud offers data processing, data centers to process and preserve the transactional data of the clients. Dynamic capacity provisioning is promising approach for reducing energy consumption by dynamicallych...

 A new approach for user identification in web usage mining preprocessing

 Web usage mining is a subset of data mining. In order to huge amount of data but the data is less appropriates “quantity and quality” of the web data is opposite to each other this is the main problem. Web  ...

 Implementation of Various Cryptosystem Using Chaos

 Cryptography is the science of secret codes, enabling the confidentiality of communication through an insecure channel to make the system more complex and robust Chaos is applied in the various cryptographic a...

 A Fast & Memory Efficient Technique for Mining Frequent Item Sets from a Data Set

 Abstract: Frequent/Periodic item set mining is a extensively used data mining method for market based analysis,privacy preserving and it is also a heart favourite theme for the resarchers. A substantial work has be...

Optimizing Task Scheduling and Resource allocation in Cloud Data Center, using Enhanced Min-Min Algorithm

Abstracts: Cloud Computing provide the chance to use computing resources over the internet without owning the infrastructure. The main content of Cloud Computing is to manage Software application, data storage and proces...

Download PDF file
  • EP ID EP115019
  • DOI -
  • Views 99
  • Downloads 0

How To Cite

B. Sruthi Patel (2013).  A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations. IOSR Journals (IOSR Journal of Computer Engineering), 12(3), 119-129. https://europub.co.uk/articles/-A-115019