Unauthorized Data Access Detection by Insertion of Duplicate Data Records
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 7
Abstract
Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is became a hot topic of research and it became a challenging part to identifying leakages. The existing methods sometimes fail to do the same. In this work, we develop an algorithm for distributing data to agents, in such a way that improves the chances of identifying a leakage. We consider to add “fake data” objects to the distributed original data which do not correspond to real entities but appear realistic to the agents. Here this fake objects act as a type of watermark for the entire set, without modifying any individual data. If an agent was given one or more fake objects that were leaked, then the distributor can find the corrupted agent who leaked the data.
Authors and Affiliations
Jagadeesh Kumar Y. , M Chinna Rao
Fixed Point Lms Adaptive Filter Using Partial Product Generator
The area and power efficiency is very important for every circuit and its applications. Here I present an efficient architecture of adaptive filter with partial product generator and delayed lms algorithm is also used...
Data mining and warehousing for Temporal Data Objects
Mobility data analysis became a more challenging task because of its huge application in different field of science and other daily applications like service accessibility, mobile marketing and traffic management. On...
Energy efficient cluster based approach in wireless Ad-hoc networks: Survey
A mobile ad-hoc network (MANET) is a collection of different mobile nodes. These nodes can communicate with each other over wireless networks using wireless links. The energy saving is an important challenge of wirel...
A New VLSI Architecture to Increase the speed of computation (Modified Booth Algorithm)
In this paper, we planned a new architecture of multiplier -and-accumulator (MAC) for high-speed arithmetic operations. By merging multiplication with accumulation and planning a hybrid type of carry save adder (CSA)...
An Approach to reduce Non-linearity of HIPERLAN/2 system using Neural Network
Simulation of ETSI’s High Performance Local Area Network Type 2(HIPERLAN/2) is presented. In this paper we present performance of HIPERLAN/2 model via a MATLAB/Simulink simulation with the original MATLAB/Simulink mo...