Data Leakage Detection and Prevention using Fake Agents

Authors

  • Gagandeep Kaur  Research Scholar,University College of Computer Applications, Guru Kashi University, Talwandi Sabo, Bathinda, Punjab, India
  • Dr. Sandeep Kautish  Professor in Computer Science, Guru Kashi University, Talwandi Sabo, Bathinda, Punjab, India

Keywords:

Allocation Strategies, Fake Records, Guilt Model

Abstract

In today's world, there is need of many companies to outsource their sure business processes (e.g. marketing, human resources) and related activities to a third party like their service suppliers. In many cases the service supplier desires access to the company’s confidential information like customer data, bank details to hold out their services. And for most corporations the amount of sensitive data used by outsourcing providers continues to increase. So in today’s condition data Leakage is a Worldwide Common Risks and Mistakes and preventing data leakage is a business-wide challenge. Thus we necessitate powerful technique that can detect such a dishonest. Traditionally, leakage detection is handled by watermarking, Watermarks can be very useful in some cases, but again, involve some modification of the original data. So in this paper, unobtrusive techniques are studied for detecting leakage of a set of objects or records. The model is developed for assessing the “guilt” of agents. The algorithms are present for distributing objects to agents, in a way that improves our chances of identifying a leaker. Finally, consider the option of adding “fake” objects to the distributed set. The major contribution in this system is to develop a guilt model using fake elimination concept.

References

  1. Papadimitriou and H. Garcia-Molina “Data leakage detection “IEEE Transaction on knowledge and data engineering, pages 51-63 volume 23, January 2011.
  2. Jaymala Chavan and Priyanka Desai “Data Leakage Detection Using Data Allocation Strategies” International Journal of Advance in Engineering and Technology(IJAET), Volume 6 issue 6,Nov 2013.
  3. YIN Fan, WANG Yu, WANG Lina, Yu Rongwei. A Trustworthiness-Based Distribution Model for Data Leakage Detection: Wuhan University Journal Of Natural Sciences.
  4. S Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies. ACM Trans. Dataset Systems, 26(2):214- 260,2001.
  5. L Sweeney. Achieving k- anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzzyness and Knowledge-based Systems- 2002
  6. Y Li, V. Swarup, and S. Jajodia. Fingerprinting relational databases: Schemes and specialties. IEEE Transactions on Dependable and Secure Computing, 02(1):34–45, 2005.
  7. P Buneman, S. Khanna and W.C. Tan. Why and where: A characterization of data provenance. ICDT 2001, 8th International Conference, London, UK, January4-6, 2001, Proceedings, volume 1973 of Lecture Nottes in Computer Science, Springer, 2001.
  8. Shabtai, Asaf, Elovici, Yuval, Rokach, Lior 2012, VIII, 92 p.9 illus. A Survey of Data Leakage Detection and Prevention Solutions.
  9. S Czerwinski, R. Fromm, and T. Hodes. Digital music distribution and audio watermarking.
  10. P. Papadimitriou and H. Garcia-Molina, “Data leakage detection”, Technical report, Stanford University, 2008.
  11. Rakesh Agrawal, Jerry Kiernan. Watermarking Relational Databases// IBM Almaden Research Center
  12. ORLDatabasehttp://blogs.csoonline.com/1187/DataLeakage

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
Gagandeep Kaur, Dr. Sandeep Kautish, " Data Leakage Detection and Prevention using Fake Agents, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 8, pp.56-62, May-June-2018.