Data Leakage Detection Using GSM

Provided by: International Journal of Computer Science and Mobile Computing (IJCSMC)
Topic: Big Data
Format: PDF
A data distributor has given sensitive data to a set of supposedly trusted agents. Sometimes, data is leaked and found in unauthorized place e.g., on the web or on somebody's laptop. For example, a hospital may give patient records to researchers who will devise new treatments. Similarly, a company may have partnerships with other companies that require sharing customer data. Another enterprise may outsource its data processing, so data might be given to various other companies. The owners of the data are called as distributors and the trusted third parties are called as agents.

Find By Topic