Unauthorized Data Access Detection by Insertion of Duplicate Data Records

Abstract

Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is became a hot topic of research and it became a challenging part to identifying leakages. The existing methods sometimes fail to do the same. In this work, we develop an algorithm for distributing data to agents, in such a way that improves the chances of identifying a leakage. We consider to add “fake data” objects to the distributed original data which do not correspond to real entities but appear realistic to the agents. Here this fake objects act as a type of watermark for the entire set, without modifying any individual data. If an agent was given one or more fake objects that were leaked, then the distributor can find the corrupted agent who leaked the data.

Authors and Affiliations

Jagadeesh Kumar Y. , M Chinna Rao

Keywords

Related Articles

(NCECD) A Novel Data Distribution Scheme for VoD Services in P2P Networks

Anonymizing networks such as Tor allow users to access internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks However has been limited b...

Design and Development of Mobile Assisted Language Learning (MALL) application for English Language using Android Push Notification Services

The pervasive nature of the mobile devices and the wide array of mobile learning applications enables the acceptance of mobile devices as an indispensable component in the current pedagogical learner-centric mode of...

Performance Analysis of Rotating Induction Machines for Air-Gap Eccentricity & Rotor Bar Faults using Finite Element Method

In this paper analysis used to diagnose Air-gap eccentricity and broken rotor bar fault especially in high voltage Rating machine. The analysis carried out to evaluate the performance of the machine during operation...

A Novel Approach for Text Dependent Speaker Recognition

In recent times, person authentication in security systems using biometric technologies has grown rapidly. The voice is a signal of infinite information. Digital signal processes such as Feature Extraction and Feature...

Intelligent Ambulance Rescue System

Traffic problems, congested traffic and flow management were recognized as major problems mostly in all the areas, which have caused problem for the ambulance which carries the emergency patient. Moreover road accide...

Download PDF file
  • EP ID EP27528
  • DOI -
  • Views 339
  • Downloads 8

How To Cite

Jagadeesh Kumar Y. , M Chinna Rao (2012). Unauthorized Data Access Detection by Insertion of Duplicate Data Records. International Journal of Research in Computer and Communication Technology, 1(7), -. https://europub.co.uk/articles/-A-27528