Unauthorized Data Access Detection by Insertion of Duplicate Data Records

Download Now
Provided by: Creative Commons
Topic: Big Data
Format: PDF
Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is became a hot topic of research and it became a challenging part to identifying leakages. The existing methods sometimes fail to do the same. In this paper, the authors develop an algorithm for distributing data to agents, in such a way that improves the chances of identifying a leakage.
Download Now

Find By Topic