A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 12, Issue 3

Abstract

 In organizations sensitive data transaction is having less security because there may be a misusability of data from one to other from past years. In previous methods they calculated how much data is  leaked but didn’t find who is leaked. In this paper, we find leakage and leaker. A data distributor has given  sensitive data to a set of supposedly trusted agents (third parties). Some of the data has leaked and found in an  unauthorized place (e.g., on the web or somebody’s laptop). The distributor should assess the likelihood of the   leaked data came from one or more agents, as opposed to having independently gathered by others. We propose  data allocation strategies (across the agents) that improve the probability of identifying leakages. These  methods don’t rely on alterations of the released data (e.g., watermarks). In some cases we can also inject  “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party.

Authors and Affiliations

B. Sruthi Patel

Keywords

Related Articles

 Analysis of Titles from the Questions of the Stack OverflowCommunity Using Natural Language Processing (NLP)Techniques

Abstract: Major online “Question and Answer” forums have proven to be of enormous help to programmersand developers from all parts of the world. One such important forum is the Stack Overflow community. In thispaper, we...

 Port Site Tuberculous Infection a Case Report and Review of Literature

 As the surgeries done by laparoscopy are increasing, associated complications are also increasing. One among them is port site infection especially port site infections due to Atypical Mycobacteriae .There is a con...

Review on Comment Volume Prediction

Abstract: In this paper we present the concept of social media and its various functional building blocks. Social media has become an ubiquitous part of social networking and content sharing. Social media make use of mob...

 Clustering Engine for Desktop Usability

 Although search and information retrieval techniques are already widely used in the Internet, its application inpersonal computers is still incipient. The management of information is relatively difficult when it c...

 Identifying Threats Associated With Man-In-The-Middle Attacks during Communication between a Mobile Device and the Back End Server in Mobile Banking Applications

 Mobile banking, sometimes referred to as M-Banking, Mbanking or SMS Banking, is a term used for performing balance checks, account transactions, payments, credit applications and other banking transactions throug...

Download PDF file
  • EP ID EP115019
  • DOI -
  • Views 104
  • Downloads 0

How To Cite

B. Sruthi Patel (2013).  A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations. IOSR Journals (IOSR Journal of Computer Engineering), 12(3), 119-129. https://europub.co.uk/articles/-A-115019