Open Access Open Access  Restricted Access Subscription Access

Identification of data leakage and detecting guilty agent

Ekatpure Pooja Bharat

Abstract


The admin or data distributor distributes the important data to trusted agent .Sometimes the some part of data is leaked & found in an unauthorized place then it becomes important for the distributor to find out the guilty agent. Traditionally, the problem of data leakage is avoided by the watermarking technique. But in watermarking there are more chances of original data modification. To remove these problems, we introduce new strategies i.e. data allocation strategies. In perturbation technique data is modified and make it ‘less sensitive’ before sending to trusted agent.

Full Text:

PDF

References


International Journal of Computer Applications on Relational Data Leakage Detection using Fake Object and Allocation Strategies by Jaymala Chavan ,Priyanka Desai.

International Research Journal of Engineering and Technology on Data Leakage Detection by Ghagare Mahesh1, Yadav Sujit2, Kamble Snehal3, Nangare Jairaj4, Shewale Ramchandra5.

IOSR Journal of Computer Engineering on Detection of Data Leakage Using Unobtrusive Techniques by Mr. Ajinkya S. Yadav1, Mr. Ravindra P. Bachate2, Prof. Shadab A. Pattekari3.

International Journal of Advanced Research in Computer and Communication Engineering on Data Leakage Detection by

Sandip A. Kale1, Prof. S.V.Kulkarni2

International Journal of Modern Engineering Research (IJMER)www.ijmer.com Vol.3, Issue.1, Priyanka Barge,Pratibha Dhawale,Namrata Kolashetti.

International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012.A Model for identifying Guilty Agents in Data Transmission Shreyta Raj, Dr. Ravinder Purwar, Ashutosh Dangwa.


Refbacks

  • There are currently no refbacks.