A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 12, Issue 3

Abstract

 In organizations sensitive data transaction is having less security because there may be a misusability of data from one to other from past years. In previous methods they calculated how much data is  leaked but didn’t find who is leaked. In this paper, we find leakage and leaker. A data distributor has given  sensitive data to a set of supposedly trusted agents (third parties). Some of the data has leaked and found in an  unauthorized place (e.g., on the web or somebody’s laptop). The distributor should assess the likelihood of the   leaked data came from one or more agents, as opposed to having independently gathered by others. We propose  data allocation strategies (across the agents) that improve the probability of identifying leakages. These  methods don’t rely on alterations of the released data (e.g., watermarks). In some cases we can also inject  “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party.

Authors and Affiliations

B. Sruthi Patel

Keywords

Related Articles

 Network Intrusion Detection in Virtual Network Systems and Countermeasure Selection (NIDCS)

 Abstract: Cloud computing provides shared resources to various cloud users. All the users share various computing resources e.g., being connected through the same switch, sharing the same data storage and the file...

Using NP Problems to Share Keys in Secret-Key Cryptography

Abstract: Public key cryptography has now become an important means for providing confidentiality by its use of key distribution, in which users can do private communication with the help of encryption keys. It also prov...

 Grid Computing- An Emerging Technology that enables large-scale resource sharing

 Abstract: In the last few years there has been a rapid exponential increase in computer processing power, data storage and communication. But still there are many complex and computation intensive problems, which c...

 VLSI Implementation of High Speed & Low Power Multiplier in FPGA

 We known that different multipliers consume most of the power in DSP computations, FIR filters. Hence, it is very important factor for modern DSP systems to built low-power multipliers to minimize the power &nbsp...

 Implementing High Performance Retrieval Process by Max-Score Ranking

 This paper presents a comparison report of two different processes of retrieving a keyword or data’s from a given database or from a multiple databases. The process1 known as Extended Boolean Retrieval (EBR)model...

Download PDF file
  • EP ID EP115019
  • DOI -
  • Views 110
  • Downloads 0

How To Cite

B. Sruthi Patel (2013).  A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations. IOSR Journals (IOSR Journal of Computer Engineering), 12(3), 119-129. https://europub.co.uk./articles/-A-115019