Data Leakage Detection and Prevention using Fake Agents
Keywords:
Allocation Strategies, Fake Records, Guilt ModelAbstract
In today's world, there is need of many companies to outsource their sure business processes (e.g. marketing, human resources) and related activities to a third party like their service suppliers. In many cases the service supplier desires access to the company’s confidential information like customer data, bank details to hold out their services. And for most corporations the amount of sensitive data used by outsourcing providers continues to increase. So in today’s condition data Leakage is a Worldwide Common Risks and Mistakes and preventing data leakage is a business-wide challenge. Thus we necessitate powerful technique that can detect such a dishonest. Traditionally, leakage detection is handled by watermarking, Watermarks can be very useful in some cases, but again, involve some modification of the original data. So in this paper, unobtrusive techniques are studied for detecting leakage of a set of objects or records. The model is developed for assessing the “guilt” of agents. The algorithms are present for distributing objects to agents, in a way that improves our chances of identifying a leaker. Finally, consider the option of adding “fake” objects to the distributed set. The major contribution in this system is to develop a guilt model using fake elimination concept.
References
- Papadimitriou and H. Garcia-Molina “Data leakage detection “IEEE Transaction on knowledge and data engineering, pages 51-63 volume 23, January 2011.
- Jaymala Chavan and Priyanka Desai “Data Leakage Detection Using Data Allocation Strategies” International Journal of Advance in Engineering and Technology(IJAET), Volume 6 issue 6,Nov 2013.
- YIN Fan, WANG Yu, WANG Lina, Yu Rongwei. A Trustworthiness-Based Distribution Model for Data Leakage Detection: Wuhan University Journal Of Natural Sciences.
- S Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies. ACM Trans. Dataset Systems, 26(2):214- 260,2001.
- L Sweeney. Achieving k- anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzzyness and Knowledge-based Systems- 2002
- Y Li, V. Swarup, and S. Jajodia. Fingerprinting relational databases: Schemes and specialties. IEEE Transactions on Dependable and Secure Computing, 02(1):34–45, 2005.
- P Buneman, S. Khanna and W.C. Tan. Why and where: A characterization of data provenance. ICDT 2001, 8th International Conference, London, UK, January4-6, 2001, Proceedings, volume 1973 of Lecture Nottes in Computer Science, Springer, 2001.
- Shabtai, Asaf, Elovici, Yuval, Rokach, Lior 2012, VIII, 92 p.9 illus. A Survey of Data Leakage Detection and Prevention Solutions.
- S Czerwinski, R. Fromm, and T. Hodes. Digital music distribution and audio watermarking.
- P. Papadimitriou and H. Garcia-Molina, “Data leakage detection”, Technical report, Stanford University, 2008.
- Rakesh Agrawal, Jerry Kiernan. Watermarking Relational Databases// IBM Almaden Research Center
- ORLDatabasehttp://blogs.csoonline.com/1187/DataLeakage
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.