Data Leakage Detection Using GSM

A data distributor has given sensitive data to a set of supposedly trusted agents. Sometimes, data is leaked and found in unauthorized place e.g., on the web or on somebody's laptop. For example, a hospital may give patient records to researchers who will devise new treatments. Similarly, a company may have partnerships with other companies that require sharing customer data. Another enterprise may outsource its data processing, so data might be given to various other companies. The owners of the data are called as distributors and the trusted third parties are called as agents.

Provided by: International Journal of Computer Science and Mobile Computing (IJCSMC) Topic: Big Data Date Added: Jun 2014 Format: PDF

Find By Topic