International Journal on Computer Science and Technology (IJCST)
The data leakage problem can be defined as any unauthorized access of data due to an improper implementation or inadequacy of a technology, process or a policy. The \"Unauthorized access\" described above can be the result of a malicious, intentional, inadvertent data leakage, or a bad business/technology process from an internal or external user. Traditionally, this leakage of data is handled by water marking technique which requires modification of data. If the watermarked copy is found at some unauthorized site then distributor can claim his ownership. To overcome the disadvantages of using watermark, data allocation strategies are used to improve the probability of identifying guilty third parties.