##plugins.themes.academic_pro.article.main##

Abstract

— A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some amount of data is leaked and found in an unauthorized machines (e.g., on the internet or computer). The distributor has to find out from whom that data get leaked. We propose data allocation strategies (across the agents) that increase the chances of detecting leakages. These techniques do not need to modify data of the released data (e.g., watermarks). In some cases we can also embed real but fake data records to further increase our chances of detecting leakage and identifying the guilty agent. Our goal is to detect when the distributors sensitive data has been leaked by agents, and detect the agent that leaked the data. Perturbation is a very useful method where the data is modified and made less sensitive before being handed to agents. we develop secure techniques for detecting leakage of a set of objects or records.

 

Index Terms – Data leakage, Detection Guilty Agent, Distributor .

##plugins.themes.academic_pro.article.details##

Author Biography

Rahul Bhanudas Shendage, Sharadchandra Pawar College of Engineering Otur ( Pune)

Department Of Information Technology
How to Cite
Shendage, R. B. (2014). Malicious Agent Detection In Multi Party Data Access Structure. International Journal of Emerging Trends in Science and Technology, 1(01). Retrieved from https://igmpublication.org/ijetst.in/index.php/ijetst/article/view/4

References

[1] A .Santhi Lakshmi , Asso.Prof.A.Bhaskar , Padmavati Vanka
“To Predict Guilty Agent using Fake Object Injection “, at International Journal of Engineering Resarch And Technology (IJERT)ISSN:2278-0181, VOL.1 Issue 5, July -2012.
[2] Panagiotis Papadimitriou , Member IEEE , Hector G Garcia-Molina Member IEEE; “Data leakage detection “, at IEEE Transaction On Knowledge and Data Engineering , VOL. 22. 2010 .
[3] Kanimozhi.C-1, Christobel Diana.S-2, “Detection of Data Leakage and Guilty Agents by Injecting Fake Records”, International Conference on Computing and Control Engineering (ICCCE 2012), 12 AND 13 April, 2012.\
[4] R. Agrawal and J. Kiernan, ―Watermarking Relational Databases,‖Proc. 28th Int’l Conf. Very Large Data Bases (VLDB ’02), VLDB Endowment, pp. 155-166, 2002.
[5] Bing Liu, Robert Grossman, Yanhong Zhai-“Mining Data Records in Web Pages.”
[6] Robert Baumgartner, Wolfgang Gatterbauer, Georg Gottlob -
“Web Data Extraction System “