Preview

Data Leakage Detection

Powerful Essays
Open Document
Open Document
2271 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Leakage Detection
DATA LEAKAGE DETECTION

.

Abstract - If a distributor has given sensitive data to a set of supposedly trusted agents (third parties) and if some of the data is leaked and found in an unauthorized place, the distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. The techniques used improves the probability of identifying leakages and finding guilty agent. These methods do not rely on alterations of the released data so authentication for editing will be provided to keep the track of file getting edited. In this “realistic but fake” data objects are injected to further improve the chances of detecting leakage and identifying the guilty party.
Keywords- data leakage, data privacy, fake objects, leakage model, guilty party.

I. INTRODUCTION

1.1 Overview

There always has been a need to transfer sensitive data to any supposedly trusted third parties. For example, a company may have partnership with another company so the transactions may involve sharing customer’s private data. The supposedly trusted third parties are the agents and the owner of the data who sends his sensitive data to the agents is called the distributor. Our goal is to detect when the distributor’s sensitive data have been leaked by agents, and to identify the agent that leaked the data. In a technique called perturbation data is modified and made less sensitive before it is handled to agents. In some applications the original sensitive data cannot be perturbed.
The distributor after sharing his sensitive data objects, which we consider here in form of file, discovers those objects at some unauthorized place. If distributor finds “enough evidence” that an agent leaked data, he may initiate legal proceedings. This model that is being developed will be useful for assessing the “guilt” of agents. Also algorithms are

You May Also Find These Documents Helpful

  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    Undoubtedly in secure DBMS, it is feasible for clients to draw gatherings from the data they get from the database. The employee working in an organization when gets certain information they may try to elaborate it or draw some important aspects related to the database from past. There are two crucial events of the finding issue, which ordinarily climb in database systems.…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    The nature of this event describes an internal breach of security in order to access and manipulate sensitive data. This internal breach was caught by the auditor, but the communications from the auditor to those who’s data was breached was intercepted.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Better Essays

    The most risky part of outsourcing data storage is that the organization may not be aware on exactly how the data is handled and managed. Especially on data that are sensitive, a simple mistake can open huge opportunities for a potential leak. When it comes to information technology, information security is extremely important. The safety of information must be considered in terms of confidentiality, integrity, availability, and non-repudiation (Byrnes & Proctor,…

    • 1256 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Sending critical information such as credit card numbers or bank account numbers puts it at risk of being intercepted by hackers or cyber attacks.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Sample 1

    • 456 Words
    • 2 Pages

    The physical protection of Finman’s data will need to be protected by proper configuration and setup of data network infrastructure. Both thirds parties will need to ensure ACL systems are set and configured to ensure access and data flow is running properly. There is to be granted access to only privilege user’s assigned and agreed upon. Authentication and authorization is to be set in place to ensure protection with Finman’s data resources along with network resources. Authentication and authorization can be applied by enforcing Group Polices. Each third party will need to have proper verification set in place otherwise known as Third Party Verification (TPV). TPV will provide both parties to meet industry standards such as Federal Communication Commission and Federal Trade Commission. Backup solutions for data storage will need to be set in place to ensure integrity of Finman’s data and meets industry standards.…

    • 456 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Target data breach is a very good example of the risks of using single level/layer defense strategies for information security in an organization. In fact, it taught us and the organizations in the information security industry a very valuable lesson as to how important is it to employ strategies like Defense in Depth, Critical Controls etc., Below is a brief summary of steps that can be taken to avoid such attacks. I've included the chain of different events that led to the Target Data breach and the Countermeasures/controls that could be put in place to counter and/or avoid such events/attacks.…

    • 690 Words
    • 3 Pages
    Good Essays
  • Good Essays

    One example the author writes about is OnStar. The facts are that OnStar knows the whereabouts and the driving tendencies at any given point of an OnStar-equipped vehicle. What if that information was stolen or given to a third party. Another example is TiVo, where they…

    • 631 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Quiz 9

    • 445 Words
    • 2 Pages

    ____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.…

    • 445 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    * Providing reliability and trust by implementing high security standards for personal data and sensitive information…

    • 1268 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Data Leakage Detection

    • 12495 Words
    • 50 Pages

    Abstract—We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases, we can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party. Index Terms—Allocation strategies, data leakage, data privacy, fake records, leakage model.…

    • 12495 Words
    • 50 Pages
    Good Essays

Related Topics