Unauthorized Data Access Detection by Insertion of Duplicate Data Records

Abstract

Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is became a hot topic of research and it became a challenging part to identifying leakages. The existing methods sometimes fail to do the same. In this work, we develop an algorithm for distributing data to agents, in such a way that improves the chances of identifying a leakage. We consider to add “fake data” objects to the distributed original data which do not correspond to real entities but appear realistic to the agents. Here this fake objects act as a type of watermark for the entire set, without modifying any individual data. If an agent was given one or more fake objects that were leaked, then the distributor can find the corrupted agent who leaked the data.

Authors and Affiliations

Jagadeesh Kumar Y. , M Chinna Rao

Keywords

Related Articles

Hybrid SVM Data mining Techniques for Weather Data Analysis of Krishna District of Andhra Region

Weather Prediction is the application of science and technology to estimate the state of atmosphere at a particular spatial location. Due to the availability of huge data researchers got interest to analyze and forec...

Dynamic ModelingAnd Control Of Wind/Pv/Battery Sources Integrated For Distributed Energy Production

This paper proposes a cross breed vitality framework comprising of wind, photovoltaic and energy component. Battery stockpiling is intended to supply persistent force and to give the deficiency power when the joined...

Automated Sentiment Analysis System Using Machine Learning Algorithms

Sentiment analysis can be very useful for business if employed correctly. In this article, I will attempt to demystify the process, provide context, and offer some concrete examples of how businesses can utilize it....

Network Processing of PT-TOPK Queries Using Necessary Set Based Algorithm in WSN’s

A wireless sensor Network consists of spatially dispersed self-directed sensors to monitor the environment conditions. This work supports innetwork top-k query process over uncertain data in a distributed wireless sen...

The Journey of Big Data: 3 V’s to 32 V’s

Every engineering and science field facing “big” data problem. Big data is one of emerging field in data science research. Different people can do as many different things with big data. So in this paper we tried to pre...

Download PDF file
  • EP ID EP27528
  • DOI -
  • Views 332
  • Downloads 8

How To Cite

Jagadeesh Kumar Y. , M Chinna Rao (2012). Unauthorized Data Access Detection by Insertion of Duplicate Data Records. International Journal of Research in Computer and Communication Technology, 1(7), -. https://europub.co.uk/articles/-A-27528