Unauthorized Data Access Detection by Insertion of Duplicate Data Records
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 7
Abstract
Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is became a hot topic of research and it became a challenging part to identifying leakages. The existing methods sometimes fail to do the same. In this work, we develop an algorithm for distributing data to agents, in such a way that improves the chances of identifying a leakage. We consider to add “fake data” objects to the distributed original data which do not correspond to real entities but appear realistic to the agents. Here this fake objects act as a type of watermark for the entire set, without modifying any individual data. If an agent was given one or more fake objects that were leaked, then the distributor can find the corrupted agent who leaked the data.
Authors and Affiliations
Jagadeesh Kumar Y. , M Chinna Rao
Self-assured Deduplication by means of economical and consistent merging basis supervision
Data deduplication is a critical system in support dispose of excess information as an option of enthralling records; it provisions simply distinct copy of file. Together with the whole associations stockpiling patte...
Nearest Neighbour Search Using Spatial Inverted Index
Spatial queries incorporate reach pursuit and closest neighbour recovery gives result to inquiry issued clients in light of articles like restaurant, hospitals and hotels. But rising applications including new sort o...
To Enable Base Station To Obtain The ‘True’ Estimate Of The Aggregate In The Presence Of The Attack
The sensor nodes appearance a multi-hop network as the base station (BS) proceeds as the central point of control. Wireless sensor networks used in different kinds of applications like Forest monitoring, weather fore...
A Review on Password Cracking Strategies
As the word itself implies, Personal Account Security S ystem WORD (PASS WORD) is a word or string of characters used for user authentication to prove identity. But now passwords are going cracked to gain unauthoriz...
An Efficient Parallel Processing Technique For Large Text Files
Now a days the data was increasing rapidly because of heterogeneous resources. The data that is useful for large organisations will required large number of computing resources for processing large data sets. there a...