Fake Objects Allocation for Data Leakage Detection

An information distributor has given sensitive data to a collection of purportedly trust worthy agents (third parties). A number of the information has leaked and located in an unauthorized place (e.g., on the net or somebody's laptop). The distributor ought to assess the probability of the leaked information came from one or a lot of agents, as opposition having severally gathered by others. The authors tend to propose information allocation methods (across the agents) that improve the likelihood of characteristic leakages.

Provided by: International Journal for Development of Computer Science & Technology (IJDCST) Topic: Big Data Date Added: Sep 2013 Format: PDF

Find By Topic