期刊名称:International Journal of Computer Trends and Technology
电子版ISSN:2231-2803
出版年度:2013
卷号:4
期号:4-5
页码:893-897 April Issue 2013 .ISSN 2231
出版社:Seventh Sense Research Group
摘要:In both the industrial and defence area, a forceful need is rising for fast, yet secure, propagation of Information. We centre on field with one information source (sender) and many information sinks (recipients) where (i) contribution is equally useful for the one who sends and for the one who receives data, (ii) disclosing a pooled information is beneficial to the addressee but adverse to the sender, and (iii) information sharing decisions of the sender are determined using imperfect monitoring of the (un)intended information leakage by the recipients. We study the following problem A data distributor (a physician) has given sensitive data to a set of supposedly trusted agents (research labs). Some of the data are leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop). The physician must assess the likelihood that the leaked data came from one or more research labs, as opposed to having been independently gathered by other means. We propose data allocation strategies (across the research labs) that improve the probability of identifying leakages. These methods do not depend on alterations of the released data (e.g., watermarks). In some cases, we can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party.
关键词:Fake object; Data leakage; Allocation strategy