Impementation of Data Watcher in Data Leakage Detection System

نویسندگان

  • N. P. Jagtap
  • S. J. Patil
  • A. K. Bhavsar
چکیده

Now days, every company is facing data leakage. That is very serious problem faced by company. An owner of enterprise has given confidential data to its employee but most of the time employee leaks the data. That leak data found in illegal place such as on the web of comparator enterprise or on laptop of employee of comparator enterprise or the owner of Comparators Company’s laptop. It May or may not be observed by owner. Leak data may be basic code or design provision, cost lists, rational property and copy rights data, trade secrets, forecasts and budgets. In this case the data leaked out it leaves the company goes in undefended the authority of the corporation. This uninhibited data leakage puts business in a back in position. To find the solution on this problem we develop two models. First, when any employee of enterprise access confidential data without the consent of owner in that case ,we developed data watcher model to identifying data leaker and suppose employee given data outside the enterprise for that we devolved second model for assessing the “guilt” of agents. Guilt model are used to improve the probability of identifying guilty third parties. For implementing this system, we used educational institute database. In this system we consider, data owner is college chairman called as distributor and other employee is called as agents. For that we considered two condition sample or explicit condition because agents want data in sample or condition.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LEAK DETECTION IN WATER DISTRIBUTION SYSTEM USING NON-LINEAR KALMAN FILTER

Leakage detection in water distribution systems play an important role in storage and management of water resources. Therefore, to reduce water loss in these systems, a method should be introduced that reacts rapidly to such events and determines their occurrence time and location with the least possible error. In this study, in order to determine position and amount of leakage in distribution ...

متن کامل

Online Monitoring and Transmission System for Lightning Detection Network

Lightning detection data is a kind of distributed information with high real-timeliness. After the lightning events are detected by the lightning detection network, the original detection data need to be collected and concentrated rapidly and timely for unified management and processing. In this paper, an online monitoring and transmission system for lightning detection information is presented...

متن کامل

Survey on Perception of People Regarding Utilization of Computer Science & Information Technology in Manipulation of Big Data, Disease Detection & Drug Discovery

this research explores the manipulation of biomedical big data and diseases detection using automated computing mechanisms. As efficient and cost effective way to discover disease and drug is important for a society so computer aided automated system is a must. This paper aims to understand the importance of computer aided automated system among the people. The analysis result from collected da...

متن کامل

A Review on Data Leakage Detection

This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT, huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, l...

متن کامل

Data Leakage Detection: A Survey

This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT. huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012