A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 12, Issue 3
Abstract
In organizations sensitive data transaction is having less security because there may be a misusability of data from one to other from past years. In previous methods they calculated how much data is leaked but didn’t find who is leaked. In this paper, we find leakage and leaker. A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data has leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop). The distributor should assess the likelihood of the leaked data came from one or more agents, as opposed to having independently gathered by others. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. These methods don’t rely on alterations of the released data (e.g., watermarks). In some cases we can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party.
Authors and Affiliations
B. Sruthi Patel
Application for Women Safety
Abstract: This project presents an alert system for Women safety detection using common commerciallyavailable electronic devices to both detect the problem and alert authorities. We use an Android based smartphone...
Fault Discovery Probability Analysis for Software Reliability Estimation
Abstract: Software reliability approximation and testing gauge how efficiently software works and meet up the end-user necessities. Software reliability assurance that users can enter the correct information on a day-to-...
Non-Intrusive Speech Quality with Different Time Scale
Speech quality evaluation is an extremely important problem in modern communication networks. Service providers always strive to achieve a certain Quality of Service (QoS) in order to ensure customer satisfaction...
Optimizing Task Scheduling and Resource allocation in Cloud Data Center, using Enhanced Min-Min Algorithm
Abstracts: Cloud Computing provide the chance to use computing resources over the internet without owning the infrastructure. The main content of Cloud Computing is to manage Software application, data storage and proces...
Visual Representations in High School Edublogs
Abstract: Visuals speak a language of their own. In fact, they can have more impact than words. Whenprepared intuitively, they have the power to overcome regional barriers, in terms of comprehensibility of verballa...