A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 12, Issue 3
Abstract
In organizations sensitive data transaction is having less security because there may be a misusability of data from one to other from past years. In previous methods they calculated how much data is leaked but didn’t find who is leaked. In this paper, we find leakage and leaker. A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data has leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop). The distributor should assess the likelihood of the leaked data came from one or more agents, as opposed to having independently gathered by others. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. These methods don’t rely on alterations of the released data (e.g., watermarks). In some cases we can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party.
Authors and Affiliations
B. Sruthi Patel
Resource-Diversity Tolerant: Resource Allocation in the Cloud Infrastructure Services
Abstract: The cloud offers data processing, data centers to process and preserve the transactional data of the clients. Dynamic capacity provisioning is promising approach for reducing energy consumption by dynamicallych...
A new approach for user identification in web usage mining preprocessing
Web usage mining is a subset of data mining. In order to huge amount of data but the data is less appropriates “quantity and quality” of the web data is opposite to each other this is the main problem. Web ...
Implementation of Various Cryptosystem Using Chaos
Cryptography is the science of secret codes, enabling the confidentiality of communication through an insecure channel to make the system more complex and robust Chaos is applied in the various cryptographic a...
A Fast & Memory Efficient Technique for Mining Frequent Item Sets from a Data Set
Abstract: Frequent/Periodic item set mining is a extensively used data mining method for market based analysis,privacy preserving and it is also a heart favourite theme for the resarchers. A substantial work has be...
Optimizing Task Scheduling and Resource allocation in Cloud Data Center, using Enhanced Min-Min Algorithm
Abstracts: Cloud Computing provide the chance to use computing resources over the internet without owning the infrastructure. The main content of Cloud Computing is to manage Software application, data storage and proces...