We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Guilt Model Process for Identifying Data Leakage and Guilty Agent in Data transmission

by S.jenila, K.sivasankari, R.arudselvi, J.maria Monica, B.saranya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 42 - Number 6
Year of Publication: 2012
Authors: S.jenila, K.sivasankari, R.arudselvi, J.maria Monica, B.saranya
10.5120/5698-7744

S.jenila, K.sivasankari, R.arudselvi, J.maria Monica, B.saranya . Guilt Model Process for Identifying Data Leakage and Guilty Agent in Data transmission. International Journal of Computer Applications. 42, 6 ( March 2012), 25-27. DOI=10.5120/5698-7744

@article{ 10.5120/5698-7744,
author = { S.jenila, K.sivasankari, R.arudselvi, J.maria Monica, B.saranya },
title = { Guilt Model Process for Identifying Data Leakage and Guilty Agent in Data transmission },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 42 },
number = { 6 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 25-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume42/number6/5698-7744/ },
doi = { 10.5120/5698-7744 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:30:42.397341+05:30
%A S.jenila
%A K.sivasankari
%A R.arudselvi
%A J.maria Monica
%A B.saranya
%T Guilt Model Process for Identifying Data Leakage and Guilty Agent in Data transmission
%J International Journal of Computer Applications
%@ 0975-8887
%V 42
%N 6
%P 25-27
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

For specific data processing activities a data distributor has to give the sensitive data to a set of third party agents. The distributor's copy of data that had been transmitted to agents may be leaked by any of them. It is necessary to identify the agents that have leaked data. To improve the chances of detecting leakage data and the guilty agents, private object is created for each record that is sent to various agents. The agent guilt model is used to find the probability of identifying agents that have leaked information. Thus it helps the distributor to turn away from that agent and also to protect the responsive data. Further process can clear the data if the agent had sent data to unauthorized person.

References
  1. P. Buneman, S. Khanna, and W. C. Tan, "Why and Where: A Characterization of Data Provenance," Proc. Eighth Int'l Conf. Database Theory (ICDT '01), J. V. den Bussche and V. Vianu, eds. , pp. 316-330, Jan. 2001.
  2. P. Buneman and W. -C. Tan, "Provenance in Databases," Proc. ACM SIGMOD, pp. 1171-1173, 2007.
  3. S. Czerwinski, R. Fromm, and T. Hodes, "Digital Music Distribution and Audio Watermarking,", 2007.
  4. S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian, "Flexible Support for Multiple Access Control Policies," ACM Trans. Database Systems, vol. 26, no. 2, pp. 214-260, 2001.
  5. P. Papadimitriou and H. Garcia-Molina, "Data Leakage Detection," IEEE Trans. on Knowledge And Data Engineering, Vol. 23, No. 1, Jan. 2011.
  6. J. J. K. O. Ruanaidh, W. J. Dowling, and F. M. Boland, "Watermarking Digital Images for Copyright Protection," IEE Proc. Vision, Signal and Image Processing, vol. 143, no. 4, pp. 250-256, 1996.
  7. R. Sion, M. Atallah, and S. Prabhakar, "Rights Protection for Relational Data," Proc. ACM SIGMOD, pp. 98-109, 2003.
  8. L. Sweeney, "Achieving K-Anonymity Privacy Protection Using Generalization and Suppression," http://en. scientificcommons. org/43196131, 2002
Index Terms

Computer Science
Information Sciences

Keywords

Data Leakage Guilt Model Private Object