tailieunhanh - Cluster based data distribution techniques for leakage detection

Data security is the very important thing in recent years. One organization has to share the data with other for business purpose. The owner of the data can also be called as data distributer and the other business organization can also be called as data agents. Agents should not share the important business data with other agents or third-party. How to detect who among the agents are guilty and done data leakage is challenging issue. | ISSN:2249-5789 Ramji Shinde et al , International Journal of Computer Science & Communication Networks,Vol 5(3),192-194 Cluster Based Data Distribution Techniques for Leakage Detection Ramji Shinde Amar Buchade Computer Engineering Pune Institute of Computer Technology Pune Email: ramshinde651@ Computer Engineering Pune Institute of Computer Technology Pune Email: Abstract—Data security is the very important thing in recent years. One organization has to share the data with other for business purpose. The owner of the data can also be called as data distributer and the other business organization can also be called as data agents. Agents should not share the important business data with other agents or third-party. How to detect who among the agents are guilty and done data leakage is challenging issue. Keywords—Distributed computing, Data security,Data privacy I. I NTRODUCTION Consider an example if I have a 120 students placement records with academic marks now the collage whose students information is nothing but data distributer now the collage will not give all the detail to everyone. Collage has to give this information to NACC committee or higher authority. Now these persons or organization is nothing but data agents. These agents are not supposed to give this data to other collage those who are searching students for higher education. The above given example is perfect for data leakage detection. If students are receiving the phone calls from other collage to take admission then data leakage is happen there. Need to find out who among the agents are guilty. Algorithm in [4] gives a high-quality key, but it has boundaries like area specific. In this paper author discussed that Probability of finding responsibility is related to error understanding system. System letdown is case where the substance is guessed by the illegal agents and not leaked by any official agency. Method discuss in[7] is necessitating the prior .

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.