A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 12, Issue 3
Abstract
In organizations sensitive data transaction is having less security because there may be a misusability of data from one to other from past years. In previous methods they calculated how much data is leaked but didn’t find who is leaked. In this paper, we find leakage and leaker. A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data has leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop). The distributor should assess the likelihood of the leaked data came from one or more agents, as opposed to having independently gathered by others. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. These methods don’t rely on alterations of the released data (e.g., watermarks). In some cases we can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party.
Authors and Affiliations
B. Sruthi Patel
Optimizing Migration of the Application Data in Cloud Environment Using ACO Algorithm and RSA Encryption
Abstract: Taking the advantages of the capabilities offered by cloud computing requires either an application to be built especially for it, or for existing application to migrated to it. The main focus on migrate the ap...
ICHALEC Improved Cluster Head And Low Energy Consumption Protocol In Wireless Sensor Network
Wireless Sensor Network is an emerging field for research in most of the aspects of mankind. It is a network composed of nodes without any central controller. Sensor network protocols have high ability to be used in each...
Challenges to Data Base Security – A Futuristic View
Abstract: In present scenario, database security is on prime consideration, for any organization because of its implementation and complex nature of system. It is generally associated with the dealing of retrieval of dat...
Intent Search and Centralized Sybil Defence Mechanism for Social Network
Abstract: Sybil attacks are the major problems occurred in the distributed systems without trusted identities. It occur when the one-to-one relationship between a node and its identity is violated. This is occurred by an...
Design of a Parliamentary Electronic Voting Response System
Abstract: Voting is an important process usually employed to reveal the opinion of a group on an issue that is under consideration such as the house of assemblies where crucial issues are deliberated upon. But in Nigeria...