id="info"

Development of Data Leakage Detection Using Data Allocation Strategies

A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). If the data distributed to third parties is found in a public/private domain then finding the guilty party is a nontrivial task to distributor. Traditionally, this leakage of data is handled by water marking technique which requires modification of data. If the watermarked copy is found at some unauthorized site then distributor can claim his ownership. To overcome the disadvantages of using watermark, data allocation strategies are used to improve the probability of identifying guilty third parties.

Provided by: International Journal of Computer Applications in Engineering Sciences (IJCAES) Topic: Mobility Date Added: Jun 2011 Format: PDF

Find By Topic