首页    期刊浏览 2024年12月04日 星期三
登录注册

文章基本信息

  • 标题:Detecting Data Leakage using Data Allocation Strategies With Fake objects
  • 本地全文:下载
  • 作者:S.P.Subalakshmi ; B.Geetha ; S.P.Karthikeyan
  • 期刊名称:International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
  • 印刷版ISSN:2278-1323
  • 出版年度:2014
  • 卷号:3
  • 期号:11
  • 页码:3855-3862
  • 出版社:Shri Pannalal Research Institute of Technolgy
  • 摘要:With huge amount of data being exchangedthese days for the purpose of business and other similarrequirements, there are possibilities of data loss. Anumber of employees in the IT sector are also notaware and do not bound to safety compliancessometimes. Also it is seen that in organizations like aBPO huge amount of data is outsourced to third partyvendors, thus data getting leaked is another possibility.The aim of this project is to protect data from gettingleaked to any unauthorized person and identify theleaker. If there is a user who is getting the product willcontact the distributor’s website, where he needs to fillthe registration form. The distributor allots thesoftware Gmail Reader to agents with a fake object,which is an xml file; it is circulated as a zipped file. Thexml file stores all the details about the user and in caseif the software gets leaked to any unsanctioned user,the details will be verified before accessing the software.If the details do not match then an email is sent to thedistributor, thus the access will be denied to theunauthorized person
  • 关键词:Allocation strategies; data leakage; data;privacy; fake records; leakage model.
国家哲学社会科学文献中心版权所有