Fake Objects Allocation for Data Leakage Detection
An information distributor has given sensitive data to a collection of purportedly trust worthy agents (third parties). A number of the information has leaked and located in an unauthorized place (e.g., on the net or somebody's laptop). The distributor ought to assess the probability of the leaked information came from one or a lot of agents, as opposition having severally gathered by others. The authors tend to propose information allocation methods (across the agents) that improve the likelihood of characteristic leakages.