A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 12, Issue 3

Abstract

 In organizations sensitive data transaction is having less security because there may be a misusability of data from one to other from past years. In previous methods they calculated how much data is  leaked but didn’t find who is leaked. In this paper, we find leakage and leaker. A data distributor has given  sensitive data to a set of supposedly trusted agents (third parties). Some of the data has leaked and found in an  unauthorized place (e.g., on the web or somebody’s laptop). The distributor should assess the likelihood of the   leaked data came from one or more agents, as opposed to having independently gathered by others. We propose  data allocation strategies (across the agents) that improve the probability of identifying leakages. These  methods don’t rely on alterations of the released data (e.g., watermarks). In some cases we can also inject  “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party.

Authors and Affiliations

B. Sruthi Patel

Keywords

Related Articles

Optimizing Migration of the Application Data in Cloud Environment Using ACO Algorithm and RSA Encryption

Abstract: Taking the advantages of the capabilities offered by cloud computing requires either an application to be built especially for it, or for existing application to migrated to it. The main focus on migrate the ap...

ICHALEC Improved Cluster Head And Low Energy Consumption Protocol In Wireless Sensor Network

Wireless Sensor Network is an emerging field for research in most of the aspects of mankind. It is a network composed of nodes without any central controller. Sensor network protocols have high ability to be used in each...

Challenges to Data Base Security – A Futuristic View

Abstract: In present scenario, database security is on prime consideration, for any organization because of its implementation and complex nature of system. It is generally associated with the dealing of retrieval of dat...

 Intent Search and Centralized Sybil Defence Mechanism for Social Network

Abstract: Sybil attacks are the major problems occurred in the distributed systems without trusted identities. It occur when the one-to-one relationship between a node and its identity is violated. This is occurred by an...

Design of a Parliamentary Electronic Voting Response System

Abstract: Voting is an important process usually employed to reveal the opinion of a group on an issue that is under consideration such as the house of assemblies where crucial issues are deliberated upon. But in Nigeria...

Download PDF file
  • EP ID EP115019
  • DOI -
  • Views 107
  • Downloads 0

How To Cite

B. Sruthi Patel (2013).  A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations. IOSR Journals (IOSR Journal of Computer Engineering), 12(3), 119-129. https://europub.co.uk/articles/-A-115019