alexa AN EFFICIENT AND ROBUST MODEL FOR DATA LEAKAGE DETECTIO
ISSN: 1948-1432

Journal of Global Research in Computer Sciences
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article

AN EFFICIENT AND ROBUST MODEL FOR DATA LEAKAGE DETECTION SYSTEM

Janga Ajay Kumar 1 and K. Rajani Devi 2
  1. Student, M.Tech (IT), Siddharth Nagar, Nalanda Institute of Engineering and Technology, A.P, India.
  2. Head of the Department, (IT), Siddharth Nagar, Nalanda Institute of Engineering and Technology, A.P, India.
Corresponding Author: Janga Ajay Kumar, E-mail: [email protected]
Related article at Pubmed, Scholar Google
 

Abstract

In every enterprise, data leakage is very serious problem faced by it. An owner of enterprise has given sensitive data to itsemployee but in most of the situation employee leak the data. That leak data found in unauthorized place such as on the web of comparator enterprise or on laptop of employee of comparator enterprise or the owner of comparators laptop. It is either observed or sometimes not observed by owner. Leak data may be source code or design specifications, price lists, intellectual property and copy rights data, trade secrets, forecasts and budgets. In this case the data leaked out it leaves the company goes in unprotected the influence of the corporation. This uncontrolled data leakage puts business in a backward position. To find the solution on this problem we develop two models. First, when any employee of enterprise access sensitive data without the consent of owner in that case ,we developed data watcher model to identifying data leaker and suppose employee given data outside the enterprise for that we devolved second model for assessing the “guilt” of agents. Guilt model are used to improve the probability of identifying guilty third parties.For implementing this system, we used SSBT’S COET, Bambhori, and Jalgaon college database. In this system we consider, data owner is college management called as distributor and other employee is called as agents. For that we considered two condition sample or explicit condition because agents want data in sample or condition

Keywords

Share This Page

Additional Info

Loading
Loading Please wait..
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords