An Implimentation on Extraction and Detection of Leak Data using Fake Tupples
Modern business activity contains the email exchange, sometimes email leakage is occurred in the company and it is widespread problem in the industry particularly in IT industry .so we study the following problem as data distributor (owner) has given sensitive data to trusted third parties called as (agents) and if that data leaked by trusted agents, particularly the leaked data is find on website also or can find out by using legal ways , we want to find out who has leaked that sensitive data. in early days for secure these sensitive data (information) Access Control Mechanism and Watermarking Technique were used, in Watermarking Technique unique code is embedded within data but it is not so useful for sensitive data. For keeping sensitive information of the company and finding out to this trusted third agent we implement this technique. This paper contains the results of Implementation of data leakage and detection of data using fake tupples.To find solution on this issue we proposed a system to find the Data leaker or identify the third party who leaks the data by using the fake Tupples.
Keywords: Data leakage, agents, fake tupples, distributor, access control
mechanism, watermarking technique
P. Papadimitriou, H. Garcia-Molina. Data Leakage Detection. IEEE Transactions on Knowledge and Data Engineering. 2011; 23:51–63p.
R. Agrawal, J. Kiernan. Watermarking Relational Databases Proc. 28th Int’l Conf. Very Large Data Bases (VLDB ’02), VLDB Endowment. 2002:155–166p.
P. Buneman, S. Khanna, W.C. Tan. Why And Where: A Characterization Of Data Provenance. 8th International Conference, London, UK, January4–6. 2001; 1973.
S. Czerwinski, R. Fromm, T. Hodes. Digital Music Distribution and Audio Watermarking.
Rakesh Agrawal, Jerry Kiernan. Watermarking Relational Databases// IBM Almaden Research Center.
- There are currently no refbacks.