期刊名称:International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
印刷版ISSN:2278-1323
出版年度:2014
卷号:3
期号:11
页码:3855-3862
出版社:Shri Pannalal Research Institute of Technolgy
摘要:With huge amount of data being exchangedthese days for the purpose of business and other similarrequirements, there are possibilities of data loss. Anumber of employees in the IT sector are also notaware and do not bound to safety compliancessometimes. Also it is seen that in organizations like aBPO huge amount of data is outsourced to third partyvendors, thus data getting leaked is another possibility.The aim of this project is to protect data from gettingleaked to any unauthorized person and identify theleaker. If there is a user who is getting the product willcontact the distributor’s website, where he needs to fillthe registration form. The distributor allots thesoftware Gmail Reader to agents with a fake object,which is an xml file; it is circulated as a zipped file. Thexml file stores all the details about the user and in caseif the software gets leaked to any unsanctioned user,the details will be verified before accessing the software.If the details do not match then an email is sent to thedistributor, thus the access will be denied to theunauthorized person
关键词:Allocation strategies; data leakage; data;privacy; fake records; leakage model.