IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET18483                                                     

Data Leakage Detection and Prevention using Fake Agents


Gagandeep Kaur, Dr. Sandeep Kautish
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
In today's world, there is need of many companies to outsource their sure business processes (e.g. marketing, human resources) and related activities to a third party like their service suppliers. In many cases the service supplier desires access to the company’s confidential information like customer data, bank details to hold out their services. And for most corporations the amount of sensitive data used by outsourcing providers continues to increase. So in today’s condition data Leakage is a Worldwide Common Risks and Mistakes and preventing data leakage is a business-wide challenge. Thus we necessitate powerful technique that can detect such a dishonest. Traditionally, leakage detection is handled by watermarking, Watermarks can be very useful in some cases, but again, involve some modification of the original data. So in this paper, unobtrusive techniques are studied for detecting leakage of a set of objects or records. The model is developed for assessing the “guilt” of agents. The algorithms are present for distributing objects to agents, in a way that improves our chances of identifying a leaker. Finally, consider the option of adding “fake” objects to the distributed set. The major contribution in this system is to develop a guilt model using fake elimination concept.

Gagandeep Kaur, Dr. Sandeep Kautish

Allocation Strategies, Fake Records, Guilt Model

  1. Papadimitriou and H. Garcia-Molina “Data leakage detection “IEEE Transaction on knowledge and data engineering, pages 51-63 volume 23, January 2011.
  2. Jaymala Chavan and Priyanka Desai “Data Leakage Detection Using Data Allocation Strategies” International Journal of Advance in Engineering and Technology(IJAET), Volume 6 issue 6,Nov 2013.
  3. YIN Fan, WANG Yu, WANG Lina, Yu Rongwei. A Trustworthiness-Based Distribution Model for Data Leakage Detection: Wuhan University Journal Of Natural Sciences.
  4. S Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies. ACM Trans. Dataset Systems, 26(2):214- 260,2001.
  5. L Sweeney. Achieving k- anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzzyness and Knowledge-based Systems- 2002
  6. Y Li, V. Swarup, and S. Jajodia. Fingerprinting relational databases: Schemes and specialties. IEEE Transactions on Dependable and Secure Computing, 02(1):34–45, 2005.
  7. P Buneman, S. Khanna and W.C. Tan. Why and where: A characterization of data provenance. ICDT 2001, 8th International Conference, London, UK, January4-6, 2001, Proceedings, volume 1973 of Lecture Nottes in Computer Science, Springer, 2001.
  8. Shabtai, Asaf, Elovici, Yuval, Rokach, Lior 2012, VIII, 92 p.9 illus. A Survey of Data Leakage Detection and Prevention Solutions.
  9. S Czerwinski, R. Fromm, and T. Hodes. Digital music distribution and audio watermarking.
  10. P. Papadimitriou and H. Garcia-Molina, “Data leakage detection”, Technical report, Stanford University, 2008.
  11. Rakesh Agrawal, Jerry Kiernan. Watermarking Relational Databases// IBM Almaden Research Center
  12. ORLDatabasehttp://blogs.csoonline.com/1187/DataLeakage

Publication Details

Published in : Volume 4 | Issue 8 | May-June - 2018
Date of Publication Print ISSN Online ISSN
2018-06-30 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
56-62 IJSRSET18483   Technoscience Academy

Cite This Article

Gagandeep Kaur, Dr. Sandeep Kautish, "Data Leakage Detection and Prevention using Fake Agents", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 8, pp.56-62, May-June-2018.
URL : http://ijsrset.com/IJSRSET18483.php