ISSN:2582-5208

www.irjmets.com

Paper Key : IRJ************782
Author: Uday Singh Chauhan,Himanshu Taiwade
Date Published: 03 Apr 2024
Abstract
We propose data allocation strategies across the agents that improve the probability of identifying leakages.These methods do not rely on alterations of the released data e.g., watermarks. In some cases, we can also injectrealistic but fake data records to further improve our chances of detecting leakage and identifying the guiltyparty. The idea of modifying the data itself to detect the leakage is not a new approach. Generally, the sensitivedata are leaked by the agents, and the specific agent responsible for the leaked data should always be detected atan early stage. Thus, the detection of data from the distributor to agents is mandatory. This project presents adata leakage detection system using various allocation strategies that assess the likelihood that the leaked datacame from one or more agents For secure transactions, allowing only authorized users to access sensitive datathrough access control policies shall prevent data leakage by sharing information only with trusted parties andalso the data should be detected from leaking through adding the fake record`s in the data set and which improvesthe probability of identifying leakages in the system. Then, finally, it is decided to implement this mechanism onthe cloud server.
Paper File to download :