Data Leakage Detection Abstract

The data sets are been distributed to the data distributors which are so called third party agents or third party users. In some circumstances, the distributed data seems to be leaked by some unknown users. This study will propose some data distribution strategies in order to increase and develop the prospects of reducing the data leakages which are not based on the changes done on the data that is released such as watermarks. Alternately, a realistic data records can be created which are not genuine in order to identify and detect the data leakages from third party user.

Existing System

In existing system, there is no possibility to distributed and perturb the sensitive and secured data which is capable of making the data less sensitive. In the existing systems, the data of the original distributor will be changed which is known as data leakage which is incorporated with the embedded data copies. The data leakers can be identified only when the data copy is within uncertified user hands and the watermarks will even be disrupted by the data recipients which turns the data into malicious data. 

Proposed System 

In the proposed system, distributors of data can identify the unauthorized users and their locations where their original data is been changed. In this system, if the unauthorized user is identified, then the distributor can stop distributing their data with the agents and even can legally penalize them for data leakage cases. This paper includes the development of a specific model by using different types of algorithms that supports the distributors to identify the unauthorized data users and it can be used to assess the faults done by the third party agents by using fake objects. 

Download Data Leakage Detection Abstract .

Leave a Reply

Your email address will not be published. Required fields are marked *