This paper is published in Volume 4, Issue 5, 2019
Area
Online Security
Author
Vaibhav Patel
Co-authors
Vaibhav Gangwar
Org/Univ
IMS Engineering College, Ghaziabad, Uttar Pradesh, India
Keywords
Allocation strategies, Data oozing, Data privacy, Fake records, Leakage model
Citations
IEEE
Vaibhav Patel, Vaibhav Gangwar. Data leakage detection and Security Strategies, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARnD.com.
APA
Vaibhav Patel, Vaibhav Gangwar (2019). Data leakage detection and Security Strategies. International Journal of Advance Research, Ideas and Innovations in Technology, 4(5) www.IJARnD.com.
MLA
Vaibhav Patel, Vaibhav Gangwar. "Data leakage detection and Security Strategies." International Journal of Advance Research, Ideas and Innovations in Technology 4.5 (2019). www.IJARnD.com.
Vaibhav Patel, Vaibhav Gangwar. Data leakage detection and Security Strategies, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARnD.com.
APA
Vaibhav Patel, Vaibhav Gangwar (2019). Data leakage detection and Security Strategies. International Journal of Advance Research, Ideas and Innovations in Technology, 4(5) www.IJARnD.com.
MLA
Vaibhav Patel, Vaibhav Gangwar. "Data leakage detection and Security Strategies." International Journal of Advance Research, Ideas and Innovations in Technology 4.5 (2019). www.IJARnD.com.
Abstract
In many organizations, business scenarios and company outsource its data to the other company or organization or agents, all these agents are known as trusted third party agents. The knowledge owner provides the confidential knowledge to the sure third party agents and their risk that any of that sure agent will leak the potential data. It is obligatory to notice the guilty agent, who leaks the data to unauthorized agents. For identification of leaked data in the existing system uses watermarking technique and data allocation strategies with adding fake objects. However, it has a deficiency is that watermarking data can be modified or change. In projected system uses AES algorithmic rule for coding of requested knowledge. As a result, an unauthorized party is unable to view or access confidential data. One more technique used for up probabilities of police work guilty agent is raincoat (Media Access Control) address.