Unauthorized Data Access Detection by Insertion of Duplicate Data Records
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 7
Abstract
Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is became a hot topic of research and it became a challenging part to identifying leakages. The existing methods sometimes fail to do the same. In this work, we develop an algorithm for distributing data to agents, in such a way that improves the chances of identifying a leakage. We consider to add “fake data” objects to the distributed original data which do not correspond to real entities but appear realistic to the agents. Here this fake objects act as a type of watermark for the entire set, without modifying any individual data. If an agent was given one or more fake objects that were leaked, then the distributor can find the corrupted agent who leaked the data.
Authors and Affiliations
Jagadeesh Kumar Y. , M Chinna Rao
Elimination Of Repeated Data Copies With Enhanced Security In Hcloud
Intending at economically solving the trouble of deduplication with discrepancy privileges in cloud computing we regard as a hybrid cloud structural design consisting of a public cloud and a private cloud. Dissimilar...
Design Basis Concerns And Challenges For The Data Environment
Big Data are becoming a new technology focus both in science and in industry and motivate technology shift to data centric architecture and operational models. There is a vital need to define the basic information/se...
Online Clustering Of Multiple Data Streams
This paper presents an online Clustering of Data Stream Algorithm which can be used for on-line summarization of multiple data stream over fixed time length. A data stream is a large and continuously increasing seque...
AODV, DSDV Performance Analysis with TCP Reno, TCP NewReno, TCP Vegas And TCP Tahoe on Mobile Ad-hoc Networksusing NS2
A mobile ad-hoc network (MANET) is a network that doesn’t need any infrastructure which is capable of communicating between nodes without any centralized administration. MANET is the best choice which is of less cost...
e-Governance initiatives in the State of Punjab
e-Governance refers to the delivery of services provided by the government through the means of ICTs (Information and Communication Technologies). The NeGP (National e-Governance Plan) is initiated by the Government...