Unauthorized Data Access Detection by Insertion of Duplicate Data Records

Abstract

Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is became a hot topic of research and it became a challenging part to identifying leakages. The existing methods sometimes fail to do the same. In this work, we develop an algorithm for distributing data to agents, in such a way that improves the chances of identifying a leakage. We consider to add “fake data” objects to the distributed original data which do not correspond to real entities but appear realistic to the agents. Here this fake objects act as a type of watermark for the entire set, without modifying any individual data. If an agent was given one or more fake objects that were leaked, then the distributor can find the corrupted agent who leaked the data.

Authors and Affiliations

Jagadeesh Kumar Y. , M Chinna Rao

Keywords

Related Articles

Episodic Reinforcement- Clustering technique (ERCT) based POPTVR and Modified POPTVRFNN for pattern classification

In general, a Fuzzy Neural Network (FNN) is characterized by its learning algorithm and its linguistic knowledge representation. However, it does not necessarily interact with its environment when the training data i...

Effective Mining Scheme for Large Streams Personalized Data Using Sparse Data

Reference methods are extremely significant in the fields of E-commerce and other Web-based services. One of the major complexities is dynamically providing high-quality suggestion on sparse data. In this paper a wor...

An Enhanced Digital Campus Security System Using RFID, GPS, GSM

In this paper a Digital Campus Security System (DCST) has been designed and implemented base on the RFID, GPS and Gsm network. DCST reads the RFID tags and sends information to lpc2148.processor gives alerts through...

A New Approach On Incremntal Affinity Propagation Clustering Technique Based On Preference

Many of the clustering algorithms were intended for discovering patterns in static data. Nowadays, more and more data e.g., blogs, Web pages, video surveillance, etc., are come into view in dynamic manner, known as d...

Multiple Private Keys with NTRU Cryptosystem

Each organization needs to protect their useful information from unauthorized users in wireless environment. Every person needs to access confidential information in less time. That means the encryption and decryption...

Download PDF file
  • EP ID EP27528
  • DOI -
  • Views 374
  • Downloads 8

How To Cite

Jagadeesh Kumar Y. , M Chinna Rao (2012). Unauthorized Data Access Detection by Insertion of Duplicate Data Records. International Journal of Research in Computer and Communication Technology, 1(7), -. https://europub.co.uk/articles/-A-27528