CFP last date
20 January 2025
Reseach Article

A Model for Traitor Detection with Appraising Approach

by Sai Prasad Kashi, N. Chandra Sekhar Reddy, G. Prabhakar Reddy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 93 - Number 3
Year of Publication: 2014
Authors: Sai Prasad Kashi, N. Chandra Sekhar Reddy, G. Prabhakar Reddy
10.5120/16192-5432

Sai Prasad Kashi, N. Chandra Sekhar Reddy, G. Prabhakar Reddy . A Model for Traitor Detection with Appraising Approach. International Journal of Computer Applications. 93, 3 ( May 2014), 1-5. DOI=10.5120/16192-5432

@article{ 10.5120/16192-5432,
author = { Sai Prasad Kashi, N. Chandra Sekhar Reddy, G. Prabhakar Reddy },
title = { A Model for Traitor Detection with Appraising Approach },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 93 },
number = { 3 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume93/number3/16192-5432/ },
doi = { 10.5120/16192-5432 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:14:49.728499+05:30
%A Sai Prasad Kashi
%A N. Chandra Sekhar Reddy
%A G. Prabhakar Reddy
%T A Model for Traitor Detection with Appraising Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 93
%N 3
%P 1-5
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today's technically empowered world it is a major task for distributors to prevent their data from false agents. Data distribution across trusted third party agents is complicated and always in the danger of misconfiscation by the users or agents. Loss of large volumes of shielded information has become regular headline event. Due to this reason data accessing in a secure way is became a hot topic of research and it became a challenging part to identifying leakages. In case of a leak, nothing can be done by the data distributor. Only possibility is forcing companies to re-issue cards, notify customers and mitigate loss of goodwill from negative publicity. The existing methods sometimes fail to do the same. In this work, we develop an algorithm for distributing data to agents, in such a way that improves the chances of identifying a leakage. We consider adding "fake data" objects to the distributed original data which do not correspond to real entities but appear realistic to the agents. Here this type of fake objects worn as a type of watermark for the entire set, without modifying any individual data. If an agent was given one or more fake objects that were leaked, then the distributor can find the corrupted agent who leaked the data. We consider adding "fake data" objects to the distributed original data which are not equivalent to real entities but appear as a practical one to the agents. If an agent was given one or more fake objects that were leaked, then the distributor can identify the guilty agent.

References
  1. IEEE Trans. on knowledge and data engineering, vol. 23, no. 1, January 2011. P. Papadimitriou and H. Garcia-Molina, "Data Leakage Detection".
  2. "Unauthorized Data Access Detection by Insertion of Duplicate Data Records". International Journal of Research in Computer and communication technology, IJRCCT, ISSN 2278-5841, Vol 1, Issue 7, December 2012. Y. Jagadeesh Kumar, M. Chinna Rao.
  3. International Journal of Emerging Trends in Engineering and Development Issue 3, Vol. 1 (January 2013)http://www. rspublication. com/ijeted/ijeted_index. htm1 Shivappa M Met agar 2Theja N 3Jayaprasad Motupalli.
  4. International Journal of Engineering Research and Development. "Detection and Avoidance of Data Leakage" Sandesh D Manocharya1, A. Prabhakar2
  5. A model for improving guilt probabilities to Identify data leakages 1A. Mounika, 2M. Satwik, 3 G. Rajesh Chandra
  6. "Provenance in Databases,"Proc. ACM SIGMOD, pp. 1171-1173, 2007. P. Buneman and W. -C. Tan
  7. International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012. "Evaluate fake objects to predicts Unauthenticated developers".
  8. International Journal of Advanced Computer and Mathematical Sciences. ISSN 2230-9624 Vol 3, Issue 3, 2012, pp 337-342 http://bipublication. com D. Krishna Madhuri, A. Jagadeswara Rao, K. C. Ravi Kumar.
  9. International Journal of Computer Trends and Technology- volume3Issue4- 2012. "Development of Data leakage Detection Using Data Allocation Strategies".
Index Terms

Computer Science
Information Sciences

Keywords

Data leakage guilty agent Traitor Fake data.