Unauthorized Data Access Detection by Insertion of Duplicate Data Records
Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is became a hot topic of research and it became a challenging part to identifying leakages. The existing methods sometimes fail to do the same. In this paper, the authors develop an algorithm for distributing data to agents, in such a way that improves the chances of identifying a leakage.