A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 12, Issue 3
Abstract
In organizations sensitive data transaction is having less security because there may be a misusability of data from one to other from past years. In previous methods they calculated how much data is leaked but didn’t find who is leaked. In this paper, we find leakage and leaker. A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data has leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop). The distributor should assess the likelihood of the leaked data came from one or more agents, as opposed to having independently gathered by others. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. These methods don’t rely on alterations of the released data (e.g., watermarks). In some cases we can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party.
Authors and Affiliations
B. Sruthi Patel
Analysis of Titles from the Questions of the Stack OverflowCommunity Using Natural Language Processing (NLP)Techniques
Abstract: Major online “Question and Answer” forums have proven to be of enormous help to programmersand developers from all parts of the world. One such important forum is the Stack Overflow community. In thispaper, we...
Port Site Tuberculous Infection a Case Report and Review of Literature
As the surgeries done by laparoscopy are increasing, associated complications are also increasing. One among them is port site infection especially port site infections due to Atypical Mycobacteriae .There is a con...
Review on Comment Volume Prediction
Abstract: In this paper we present the concept of social media and its various functional building blocks. Social media has become an ubiquitous part of social networking and content sharing. Social media make use of mob...
Clustering Engine for Desktop Usability
Although search and information retrieval techniques are already widely used in the Internet, its application inpersonal computers is still incipient. The management of information is relatively difficult when it c...
Identifying Threats Associated With Man-In-The-Middle Attacks during Communication between a Mobile Device and the Back End Server in Mobile Banking Applications
Mobile banking, sometimes referred to as M-Banking, Mbanking or SMS Banking, is a term used for performing balance checks, account transactions, payments, credit applications and other banking transactions throug...