International Journal for Development of Computer Science & Technology (IJDCST)
An information distributor has given sensitive data to a collection of purportedly trust worthy agents (third parties). A number of the information has leaked and located in an unauthorized place (e.g., on the net or somebody's laptop). The distributor ought to assess the probability of the leaked information came from one or a lot of agents, as opposition having severally gathered by others. The authors tend to propose information allocation methods (across the agents) that improve the likelihood of characteristic leakages.