Security Test by using F T M and Data Allocation Strategies on Leakage Detection

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2

Abstract

The data distributors work is to give sensitive data to a set of presumably trusted third party agents.The data i.e., sent to these third parties are available on the unauthorized places like web and or some ones systems, due to data leakage. The distributor must know the way the data was leaked from one or more agents instead of as opposed to having been independently gathered by other means. Our new proposal on data allocation strategies will improve the probability of identifying leakages along with Security attacks typically result from unintended behaviors or invalid inputs.  Due to too many invalid inputs in the real world programs is labor intensive about security testing.The most desirable thing is to automate or partially automate security-testing process. In this paper we represented Predicate/ Transition nets approach for security tests automated generationby using formal threat models to detect the agents using allocation strategies without modifying the original data.The guilty agent is the one who leaks the distributed data. To detect guilty agents more effectively the idea is to distribute the data intelligently to agents based on sample data request and explicit data request. The fake object implementation algorithms will improve the distributor chance of detecting guilty agents.

Authors and Affiliations

Pallavali Radha, G. Sireesha

Keywords

Related Articles

Study on Non Functional Software Testing

Improving software quality involves reducing the quantity of defects within the final product and identifying the remaining defects as early as possible. It involves both its functionality and its non-functional characte...

Providing Security in Data Aggregation using RSA algorithm

The RSA algorithm proposed by Rivest, Adi Shamir and Leonard Adleman is cryptography technique. The current problem with wireless sensor network is how to protect the  security of the sensor data. RSA algoritm is used a...

Development of An Examination Authentication Embedded System Based on Fingerprint Approach

Security is crucial all around. Access into institutions, examination centers, organizations or even estates ought to be controlled and closely monitored through a verification system. The method of authenticating a stud...

COMPARATIVE STUDY AND ANALYSIS OF BER OF CDMA FOR DIFFERENT MODULATION SCHEME

With the increasing demand in wireless communication, it has become necessary to give better and efficient service to users by using better technique. This paper propose and analyse the bit error rate of CDMA, for differ...

Ghost-Free High Dynamic Range Imaging Using Histogram Separation and Edge Preserving Denoising

In this paper, we introduce a ghost-free High Dynamic Range imaging algorithm for obtaining ghost-free high dynamicrange (HDR) images. The multiple image fusion based HDR method work only on condition that there is no mo...

Download PDF file
  • EP ID EP649968
  • DOI 10.24297/ijct.v4i2b1.3227
  • Views 113
  • Downloads 0

How To Cite

Pallavali Radha, G. Sireesha (2013). Security Test by using F T M and Data Allocation Strategies on Leakage Detection. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 4(2), 393-400. https://europub.co.uk/articles/-A-649968