• DocumentCode
    618274
  • Title

    Comparative evaluation of algorithms for effective data leakage detection

  • Author

    Kumar, Ajit ; Goyal, Ankur ; Kumar, Ajit ; Chaudhary, Navneet Kumar ; Sowmya Kamath, S.

  • Author_Institution
    Dept. of Inf. Technol., NITK, Surathkal, India
  • fYear
    2013
  • fDate
    11-12 April 2013
  • Firstpage
    177
  • Lastpage
    182
  • Abstract
    Researchers have proposed several mechanisms to secure data from unauthorized use but there is very less work in the field of detecting and managing an authorized or trustworthy agent that has caused a data leak to some third party advertently or unknowingly. In this paper, we implement methods aimed at improving the odds of detecting such leakages when a distributer´s sensitive data has been leaked by trustworthy agents and also to possibly identify the agent(s) that leaked the data. We also implement some data allocation strategies that can improve the probability of identifying leakages and can also be used to assess the likelihood of a leak at a particular agent assuming the fact that the data was not simply guessed by the third party where the leaked data set has been found. We also propose new allocation strategies that work on the basis of No-Wait model, i.e. agent does not need to wait for other agents´ allocation and it is different from already proposed model that makes an agent wait for others. These methods do not rely on the alterations of the distributed data, but rather focus on minimizing the overlapping of the allocated data items to various agents, thus facilitating an exact determination of the guilty agent in a particular data leakage scenario.
  • Keywords
    authorisation; probability; trusted computing; authorization; comparative evaluation; data allocation strategies; data leakage detection; probability; secure data; trustworthy agent; Communications technology; Conferences; Data models; Distributed databases; Information technology; Measurement; Resource management; Allocation Strategies; Data Leakage; Data privacy; Detection and Prevention; Guilt model;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information & Communication Technologies (ICT), 2013 IEEE Conference on
  • Conference_Location
    JeJu Island
  • Print_ISBN
    978-1-4673-5759-3
  • Type

    conf

  • DOI
    10.1109/CICT.2013.6558085
  • Filename
    6558085