期刊名称:International Journal of Computer Science & Technology
印刷版ISSN:2229-4333
电子版ISSN:0976-8491
出版年度:2012
卷号:3
期号:3
页码:743-746
语种:English
出版社:Ayushmaan Technologies
摘要:In every organization the sensitive data has to share with other trusted agents (third parties). Whenever the data distribute to the third parties sometimes we found sensitive data in unauthorized place (e.g., on the web or somebody’s laptop). In every enterprise data leakage is a serious problem faced by it. Sometimes leakage is observed or not observed by owner. Leak data may be source code, intellectual property, price lists, social security code, etc based on type of company or organization. The owner of the data must estimate the chance that leaked data came from one or more agents, as opposed to having been independently gathered by others. Here we implement allocation strategies while allocating data to the agents. These methods do not rely alterations of released data (e.g., watermarks). Here we use “realistic but fake” data records to improve the chances of detecting guilt agent. Here we can also use k-anonymity technique to provide privacy to the data using generalization method before distribute to the agents.