International Journal on Computer Science and Technology (IJCST)
In every organization the sensitive data has to share with other trusted agents (third parties). Whenever the data distribute to the third parties sometimes the people found sensitive data in unauthorized place (e.g., on the web or somebody's laptop). In every enterprise data leakage is a serious problem faced by it. Sometimes leakage is observed or not observed by owner. Leak data may be source code, intellectual property, price lists, social security code, etc based on type of company or organization. The owner of the data must estimate the chance that leaked data came from one or more agents, as opposed to having been independently gathered by others. Here, the authors implement allocation strategies while allocating data to the agents.