Data Leakage Essay

4381 words - 18 pages

International Journal of Scientific & Engineering Research, Volume 3, Issue 6, June-2012
ISSN 2229-5518

1

Data Leakage and Detection of Guilty Agent
Rupesh Mishra, D.K. Chitre
Abstract— Organizations apply data or information security only in terms of protecting their network from intruders (e.g. hackers) but with
growing amount of sensitive data and rapid growth in the sizes of organizations (e.g. due to globalization), rise in number of data points
(machines and servers) and easier modes of communication, sometime accidental or even deliberate leakage of data from within the
organization has become a painful reality. This has lead to growing awareness about sensitive data ...view middle of the document...

Another
enterprise may outsource its data processing, so data must be
given to various other companies. Owner of the data is termed
as the distributor and the supposedly trusted third parties are
called as the agents. Our goal is to identify the guilty agent
when distributor’s sensitive data have been leaked by some
agents. Perturbation and watermarking are techniques which
can be helpful in such situations. Perturbation is a very useful
technique where the data is modified and made less sensitive
before being handed to agents. For example, one can add random noise to certain attributes, or one can replace exact values
by ranges [2]. However, in some cases, it is important not to
alter the original distributor’s data. For example, if an outsourcer is doing our payroll, he must have the exact salary and
customer bank account numbers. If medical researchers treating the patients (as opposed to simply computing statistics),
————————————————

Rupesh Mishra is currently pursuing masters degree program in computer
engineering in University, India,. E-mail: rrupesh.mishra@gmail.com
Prof. D. K. Chitre has masters degree in computer engineering and working
As assistant Professor in Terna Engineering College, India,
E-mail: dkchitre@rediffmail.com

they may need accurate data for the patients.
In this paper such applications are considered where the
original sensitive data cannot be perturbed. Traditionally, leakage detection is handled by watermarking, e.g., a unique
code is embedded in each distributed copy [3]. If that copy is
later discovered in the hands of an unauthorized party, the
leaker can be identified. Watermarks can be very useful in
some cases, but again, they involve some modification of the
original data. Furthermore, watermarks can sometimes be destroyed if the data recipient is malicious, for leakage detection
unobtrusive technique is required.
In the business process after giving set of objects to agents,
the distributor discovers some of those same objects in an
unauthorized place. (For example, the data may be found on a
website, or obtained through a legal discovery process). At
this point, the distributor can assess the likelihood that the
leaked data has come from one or more agents, as opposed to
having been independently gathered by other means. Using
an analogy with cookies stolen from a cookie jar, if we catch
Freddie with a single cookie, he can argue that a friend gave
him the cookie. But if we catch Freddie with five cookies, it
will be much harder for him to argue that his hands were not
in the cookie jar. If the distributor sees ―enough evidence‖ that
an agent leaked data, he may stop doing business with him, or
may initiate legal proceedings [4].
In this paper, section 2 includes the problem definition in
detail, Section 3 covers work done in this area, Section 4
represents problem setup and notation related with the data
leakage detection system, Section 5 explains the agent...

Other Essays Like Data Leakage

Lab 6: Auditing the Workstation Domain for Compliance

967 words - 4 pages Lab 6: Auditing the Workstation Domain for Compliance Question 1 – What are some common risks, threats, vulnerabilities commonly found in the Remote Access Domain that must be mitigated through a layered security strategy? a. Some common risks, threats, or vulnerabilities are company laptop stolen, software keyloggers being put on computers and having passwords and user accounts stolen, data leakage, and unauthorized access to the network

Physiox 9.0 Lab 6 Essay

592 words - 3 pages found? You correctly answered: a. outside of the cell Experiment Data: Solution ---Calcium Sodium Potassium Heart Rate 59 69 34 then erratic 28 then erratic 02/26/13 page 2 02/26/13 page 3 Post-lab Quiz Results You scored 100% by answering 4 out of 4 questions correctly. 1. The addition of most of the ions resulted in You correctly answered: c. an erratic heart rate. 2. The effect of potassium on the heart is You correctly

Security Policy Framework

1330 words - 6 pages are met then this one will help also, having a disaster recovery plan in place, and by setting and performing normal backups of our network. The last challenge in the remote access domains can be data leakage, brute force attacks, and unauthorized remote access to systems. Making sure that those group policies are set and the proper controls are on the network can help with some problems that we may face on the network. With the growing need

Role Of Social Media In Business

1022 words - 5 pages regarding the nature and the amount of information shared are always there. While some social networkers strictly control information about themselves, others allow full access to anyone on the internet. This leads to data prone to leakage. Also social networking sites allow unknown people to connect to each other which may lead to hacking and at the same time may result in development of healthy relationships. So it becomes very difficult to balance

Security Vulnerability

1148 words - 5 pages ,servers),networkandcommunications,locality |  Software,data,information,knowledge | Staff,command,management,policies,procedures,training,authentication |  Ship,building,power,water,air,environment | Design/Architecture | Singularity |  Network and communications affected | Software as well as data has been compromised |  Centralized management system as well as procedures and authentication needed to access | Hardware and software | | Uniqueness

Intelligent Pigging Services Market Projected to be Worth 826.5 Mn by 2025

2119 words - 9 pages Social Media Research Hari. T (Sr. Manager - Global Business Development) Email: hari.t@futuremarketinsights.com     Chemicals & Materials Food and Beverages Services and Utilities Energy, Mining, Oil, and Gas Research Methodology (1/2) SYSTEMMATIC RESEARCH APPROACH 1 Market Profiling Formulating discussion guide 2 Developing list of respondents 3 Data Collection In-depth secondary

The New York Times and the Boston Scientific

1868 words - 8 pages service across nearly two dozen newspapers, a radio station, and more than 50 Web sites. “Our role is to accelerate our entry onto new platforms by identifying opportunities, conceptualizing, and prototyping ideas,” explains Michael Zimbalist, the company’s vice president of R&D. Zimbalist’s staff of 12 includes experts in rapid prototyping, specialists in areas like mobile or cloud computing and data miners who probe Web site data for insight into

Urbs 380 Midterm Study Guide

749 words - 3 pages data, know how to calculate a multiplier effect (know the formula!) & know what the number represents. Know what ‘leakage’ is (can refer to Loxley and Lamb reading), and what effect it has on the multiplier. Within the shift-share approach, what does the ‘shift term’ represent? Know the key assumption of the early version of ‘location theory’ In a polycentric city, does the central city still matter? Why or why not? (refer

Absorbed Glass Mat (AGM) Battery Market: Global Industry Analysis and Forecast 2016 - 2026

1207 words - 5 pages Consultants, who use proprietary data sources and various tools and techniques to gather, and analyze information. Our business offerings represent the latest and the most reliable information indispensable for businesses to sustain a competitive edge. Each PMR Syndicated Research report covers a different sector - such as pharmaceuticals, chemical, M a r k e t energy, food & beverages, semiconductors, med-devices, consumer goods and

It in Hospitals

1061 words - 5 pages patients’ vital signs will be recorded and analyzed in real-time. If the data of any particular patient is not at the normal state, warning signal will be sent to corresponding staff’s PDA. 3. Electronic medical fact sheets and forms All medical fact sheets, recording facts of patients, such as blood sugar level, would be completed by PDA in electronic basis. The PDA used by staff can be connected to different medical devices, such as blood

Silicon Realization

5085 words - 21 pages convergence of late-stage design and manufacturing data into the early phases of the design process In contrast to traditional EDA, Silicon Realization is not solely about solving a place-and-route problem, or building a more efficient op amp, or getting a tool to run 1.3x faster—it’s all of that and more. Silicon Realization is about solving the overall silicon design problem and bringing together everything that’s needed to produce complex

Related Papers

During This Dissertation The Technical Characteristics Of A Radial Flow Pump Were Examined

6067 words - 25 pages . Objectives 13. Theoretical Calculations 23.1 Hydraulic calculations 23.1.1 Method of triangles 33.1.2 Leakage losses 43.1.3 Slip losses 43.1.4 Shock and friction losses 54. Performance test of the pump unit 94.1 Introduction - Objectives 94.2 Principle arrangement of the test bed 94.3

Pros And Cons Of Storing Nuclear Waste At The Yucca Mountains

1150 words - 5 pages storage facility for the waste. According to a 1998 study, Yucca Mountain fits this requirement. Summarizing 15 years of site data, the Department of Energy report stated that the arid climate and stable geology would reduce the risk of a leak, with any leakage having to pass through 1000 feet of rock to reach the water level (as cited in Hansen, 2001). The study concludes that once sealed, there would be little or no increase in radiation exposure

Mba Course Essay

989 words - 4 pages tremendous economic losses to e-commerce. Secondly, in terms of the problems related to the security of online transaction, I suggest to pay more attention to the customers’ information leakage. Before obtaining the data holder’s consent, people’s private information sometimes is always used for other purposes by the websites. There are also many cases about consumers’ information leakage by shopping online in US. Thirdly, e-commerce is also

Do You Agree Or Disagree: Technology Helps To Make People's Lives Simpler Or Make People's Lives More Complicated?

528 words - 3 pages avoiding collisions is itself a complex question, the system we’ve built to handle this problem has essentially become too complicated for us to understand. This escalating complexity points to a larger phenomenon in modern life.For example,we use a computer to make processing information more easily,but we have to install extra apps to help us and also anti-virus software to protect the data.If we unfortunately lose the data,we have to pay a great