Provided by: International Journal of Computer Science and Mobile Computing (IJCSMC)
Topic: Big Data
Date Added: Jan 2014
This paper presents a proactive protect scheme based on Data protection Server. The authors propose an improved approach based on detection of leakage and identifying the guilty party which enhances the security of data. A data distributor has given sensitive data to a set of supposedly trusted agents (third Parties). Some of the data are leaked and found in an unauthorized place (e.g., on the web or somebody's laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other Means. They propose data allocation strategies (across the agents) that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks).