首页    期刊浏览 2024年11月15日 星期五
登录注册

文章基本信息

  • 标题:Data Leakage Detection Using Encrypted Fake Objects
  • 本地全文:下载
  • 作者:Anusha.Koneru ; G. Siva Nageswara Rao ; J.Venkata Rao
  • 期刊名称:International Journal of Computer Science and Network Security
  • 印刷版ISSN:1738-7906
  • 出版年度:2014
  • 卷号:14
  • 期号:3
  • 页码:115-120
  • 出版社:International Journal of Computer Science and Network Security
  • 摘要:Data leakage is a budding security threat to organizations, particularly when data leakage is carried out by trusted agents. In this paper, we present unobtrusive techniques for detecting data leakage and assessing the ��guilt�� of agents. Water marking is the long-established technique used for data leakage detection which involves some modification to the original data. To overcome the disadvantages of using watermark, data allocation strategies are used to improve the feasibility of detecting guilty agent. Distributor ��intelligently�� allocates data based on sample request and explicit request using allocation strategies in order to better the effectiveness in detecting guilty agent. Fake objects are designed to look like real objects, and are distributed to agents together with requested data. Fake objects encrypted with a private key are designed to look like real objects, and are distributed to agents together with requested data. By this way we can identify, the guilty agent who leaked the data by decrypting his fake object
  • 关键词:Allocation strategies; data leakage; encryption; decryption; fake objects; guilty agent; optimization
国家哲学社会科学文献中心版权所有