We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Relational Data Leakage Detection using Fake Object and Allocation Strategies

by Jaymala Chavan, Priyanka Desai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 16
Year of Publication: 2013
Authors: Jaymala Chavan, Priyanka Desai
10.5120/13952-1712

Jaymala Chavan, Priyanka Desai . Relational Data Leakage Detection using Fake Object and Allocation Strategies. International Journal of Computer Applications. 80, 16 ( October 2013), 15-21. DOI=10.5120/13952-1712

@article{ 10.5120/13952-1712,
author = { Jaymala Chavan, Priyanka Desai },
title = { Relational Data Leakage Detection using Fake Object and Allocation Strategies },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 16 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 15-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number16/13952-1712/ },
doi = { 10.5120/13952-1712 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:54:42.134864+05:30
%A Jaymala Chavan
%A Priyanka Desai
%T Relational Data Leakage Detection using Fake Object and Allocation Strategies
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 16
%P 15-21
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today's world, there is need of many companies to outsource their sure business processes (e. g. marketing ,human resources) and related activities to a third party like their service suppliers. In many cases the service supplier desires access to the company's confidential information like customer data, bank details to hold out their services. And for most corporations the amount of sensitive data used by outsourcing providers continues to increase. So in today's condition data Leakage is a Worldwide Common Risks and Mistakes and preventing data leakage is a business-wide challenge. Thus we necessitate powerful technique that can detect such a dishonest. Traditionally, leakage detection is handled by watermarking, Watermarks can be very useful in some cases, but again, involve some modification of the original data. So in this paper, unobtrusive techniques are studied for detecting leakage of a set of objects or records. The model is developed for assessing the "guilt" of agents. The algorithms are present for distributing objects to agents, in a way that improves our chances of identifying a leaker. Finally, consider the option of adding "fake" objects to the distributed set. The major contribution in this system is to develop a guilt model using fake elimination concept

References
  1. Papadimitriou and H. Garcia-Molina "Data leakage detection " IEEE Transaction on knowledge and data engineering, pages 51-63 volume 23,January 2011.
  2. Jaymala Chavan and Priyanka Desai "Data Leakage Detection Using Data Allocation Strategies" International Journal of Advance in Engineering and Technology(IJAET), Volume 6 issue 6,Nov 2013.
  3. YIN Fan, WANG Yu, WANG Lina, Yu Rongwei. A Trustworthiness-Based Distribution Model for Data Leakage Detection: Wuhan University Journal Of Natural Sciences.
  4. S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies. ACM Trans. Dataset Systems, 26(2):214-260,2001.
  5. L. Sweeney. Achieving k- anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzzyness and Knowledge-based Systems- 2002
  6. Y. Li, V. Swarup, and S. Jajodia. Fingerprinting relational databases: Schemes and specialties. IEEE Transactions on Dependable and Secure Computing, 02(1):34–45, 2005.
  7. P. Buneman, S. Khanna and W. C. Tan. Why and where: A characterization of data provenance. ICDT 2001, 8th International Conference, London, UK, January4-6, 2001, Proceedings, volume 1973 of Lecture Notes in Computer Science, Springer, 2001.
  8. Shabtai, Asaf, Elovici, Yuval, Rokach, Lior 2012, VIII, 92 p. 9 illus. A Survey of Data Leakage Detection and Prevention Solutions.
  9. S. Czerwinski, R. Fromm, and T. Hodes. Digital music distribution and audio watermarking.
  10. P. Papadimitriou and H. Garcia-Molina, "Data leakage detection", Technical report, Stanford University, 2008.
  11. Rakesh Agrawal, Jerry Kiernan. Watermarking Relational Databases// IBM Almaden Research Center
  12. ORLDatabasehttp://blogs. csoonline. com/1187/DataLeakage
Index Terms

Computer Science
Information Sciences

Keywords

Allocation Strategies Fake Records Guilt Model