Unauthorized Data Access Detection by Insertion of Duplicate Data Records
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 7
Abstract
Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is became a hot topic of research and it became a challenging part to identifying leakages. The existing methods sometimes fail to do the same. In this work, we develop an algorithm for distributing data to agents, in such a way that improves the chances of identifying a leakage. We consider to add “fake data” objects to the distributed original data which do not correspond to real entities but appear realistic to the agents. Here this fake objects act as a type of watermark for the entire set, without modifying any individual data. If an agent was given one or more fake objects that were leaked, then the distributor can find the corrupted agent who leaked the data.
Authors and Affiliations
Jagadeesh Kumar Y. , M Chinna Rao
(NCECD) A Novel Data Distribution Scheme for VoD Services in P2P Networks
Anonymizing networks such as Tor allow users to access internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks However has been limited b...
Design and Development of Mobile Assisted Language Learning (MALL) application for English Language using Android Push Notification Services
The pervasive nature of the mobile devices and the wide array of mobile learning applications enables the acceptance of mobile devices as an indispensable component in the current pedagogical learner-centric mode of...
Performance Analysis of Rotating Induction Machines for Air-Gap Eccentricity & Rotor Bar Faults using Finite Element Method
In this paper analysis used to diagnose Air-gap eccentricity and broken rotor bar fault especially in high voltage Rating machine. The analysis carried out to evaluate the performance of the machine during operation...
A Novel Approach for Text Dependent Speaker Recognition
In recent times, person authentication in security systems using biometric technologies has grown rapidly. The voice is a signal of infinite information. Digital signal processes such as Feature Extraction and Feature...
Intelligent Ambulance Rescue System
Traffic problems, congested traffic and flow management were recognized as major problems mostly in all the areas, which have caused problem for the ambulance which carries the emergency patient. Moreover road accide...