期刊名称:International Journal of Computer Science and Information Technologies
电子版ISSN:0975-9646
出版年度:2013
卷号:4
期号:2
页码:338-340
出版社:TechScience Publications
摘要:Data leakage is a budding security threat to organizations, particularly when data leakage is carried out by trusted agents. In this paper, we present unobtrusive techniques for detecting data leakage and assessing the “guilt” of agents. Water marking is the long-established technique used for data leakage detection which involves some modification to the original data. To overcome the disadvantages of using watermark, data allocation strategies are used to improve the feasibility of detecting guilty agent. Distributor ”intelligently” allocates data based on sample request and explicit request using allocation strategies in order to better the effectiveness in detecting guilty agent. Fake objects are designed to look like real objects, and are distributed to agents together with requested data. If it turns out that an agent was given one or more fake objects that were leaked, then the distributor can be more confident that agent was guilty.
关键词:Allocation strategies; data leakage; fake objects;guilty agent; optimization.