Detecting the Data Leakage Using Fake Objects

Provided by: International Journal of Communications and Engineering
Topic: Data Management
Format: PDF
A data distributor has given sensitive data to a set of supposedly trusted agents. Some of the data are leaked and found in an unauthorized place. The distributor must assess the likelihood that the leaked data came from one or more agents as opposed to having been independently gathered by other means. The authors propose data allocation strategies (across the agents) that improve the probability of identifying leakages. Leakage detection is handled by watermarking, e.g., a unique code is embedded in each distributed copy. If that copy is later discovered in the hands of an unauthorized party, the leaker can be identified.

Find By Topic