DocumentCode :
618274
Title :
Comparative evaluation of algorithms for effective data leakage detection
Author :
Kumar, Ajit ; Goyal, Ankur ; Kumar, Ajit ; Chaudhary, Navneet Kumar ; Sowmya Kamath, S.
Author_Institution :
Dept. of Inf. Technol., NITK, Surathkal, India
fYear :
2013
fDate :
11-12 April 2013
Firstpage :
177
Lastpage :
182
Abstract :
Researchers have proposed several mechanisms to secure data from unauthorized use but there is very less work in the field of detecting and managing an authorized or trustworthy agent that has caused a data leak to some third party advertently or unknowingly. In this paper, we implement methods aimed at improving the odds of detecting such leakages when a distributer´s sensitive data has been leaked by trustworthy agents and also to possibly identify the agent(s) that leaked the data. We also implement some data allocation strategies that can improve the probability of identifying leakages and can also be used to assess the likelihood of a leak at a particular agent assuming the fact that the data was not simply guessed by the third party where the leaked data set has been found. We also propose new allocation strategies that work on the basis of No-Wait model, i.e. agent does not need to wait for other agents´ allocation and it is different from already proposed model that makes an agent wait for others. These methods do not rely on the alterations of the distributed data, but rather focus on minimizing the overlapping of the allocated data items to various agents, thus facilitating an exact determination of the guilty agent in a particular data leakage scenario.
Keywords :
authorisation; probability; trusted computing; authorization; comparative evaluation; data allocation strategies; data leakage detection; probability; secure data; trustworthy agent; Communications technology; Conferences; Data models; Distributed databases; Information technology; Measurement; Resource management; Allocation Strategies; Data Leakage; Data privacy; Detection and Prevention; Guilt model;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information & Communication Technologies (ICT), 2013 IEEE Conference on
Conference_Location :
JeJu Island
Print_ISBN :
978-1-4673-5759-3
Type :
conf
DOI :
10.1109/CICT.2013.6558085
Filename :
6558085
Link To Document :
بازگشت