Assess Agent Guilt Model and Handling Data Allocation Strategies for Data Distribution
release_6ozonahyg5b2xn5taefixozehq
by
S Poovarasan,
C Sakthivel,
A Velkuppannasamy,
Mr Karthikeyan
2015
Abstract
A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). The data are leaked and found in an unauthorized place (e.g., on the web or somebody's laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to have independent that gathered by other means. Data allocation strategies that we proposed (across the agents) improve the probability of identifying leakages. The model doesn't rely on alterations of the released data (e.g., watermarks). In the proposed system, injected "realistic but fake" data records to further improve the chances of detecting leakage and identifying the guilty party.
In text/plain
format
Archived Files and Locations
application/pdf
315.6 kB
file_j257dy6dhzam5olen43r6x66fe
|
web.archive.org (webarchive) www.ijirst.org (web) |
article-journal
Stage
unknown
Year 2015
access all versions, variants, and formats of this works (eg, pre-prints)