Unauthorized Data Access Detection by Insertion of Duplicate Data Records
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 7
Abstract
Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is became a hot topic of research and it became a challenging part to identifying leakages. The existing methods sometimes fail to do the same. In this work, we develop an algorithm for distributing data to agents, in such a way that improves the chances of identifying a leakage. We consider to add “fake data” objects to the distributed original data which do not correspond to real entities but appear realistic to the agents. Here this fake objects act as a type of watermark for the entire set, without modifying any individual data. If an agent was given one or more fake objects that were leaked, then the distributor can find the corrupted agent who leaked the data.
Authors and Affiliations
Jagadeesh Kumar Y. , M Chinna Rao
Episodic Reinforcement- Clustering technique (ERCT) based POPTVR and Modified POPTVRFNN for pattern classification
In general, a Fuzzy Neural Network (FNN) is characterized by its learning algorithm and its linguistic knowledge representation. However, it does not necessarily interact with its environment when the training data i...
Effective Mining Scheme for Large Streams Personalized Data Using Sparse Data
Reference methods are extremely significant in the fields of E-commerce and other Web-based services. One of the major complexities is dynamically providing high-quality suggestion on sparse data. In this paper a wor...
An Enhanced Digital Campus Security System Using RFID, GPS, GSM
In this paper a Digital Campus Security System (DCST) has been designed and implemented base on the RFID, GPS and Gsm network. DCST reads the RFID tags and sends information to lpc2148.processor gives alerts through...
A New Approach On Incremntal Affinity Propagation Clustering Technique Based On Preference
Many of the clustering algorithms were intended for discovering patterns in static data. Nowadays, more and more data e.g., blogs, Web pages, video surveillance, etc., are come into view in dynamic manner, known as d...
Multiple Private Keys with NTRU Cryptosystem
Each organization needs to protect their useful information from unauthorized users in wireless environment. Every person needs to access confidential information in less time. That means the encryption and decryption...