International Journal for Innovative Research in Science and Technology (IJIRST)
A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). The data are leaked and found in an unauthorized place (e.g. on the web or somebody's laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to have independent that gathered by other means. Data allocation strategies that the authors proposed (across the agents) improve the probability of identifying leakages.