Big Data

Unauthorized Data Access Detection by Insertion of Duplicate Data Records

Date Added: Dec 2012
Format: PDF

Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is became a hot topic of research and it became a challenging part to identifying leakages. The existing methods sometimes fail to do the same. In this paper, the authors develop an algorithm for distributing data to agents, in such a way that improves the chances of identifying a leakage.