Submitted by: Submitted by sanjaydyp
Views: 10
Words: 4355
Pages: 18
Category: Other Topics
Date Submitted: 09/16/2015 09:05 PM
International Journal of Scientific & Engineering Research, Volume 3, Issue 6, June-2012
ISSN 2229-5518
1
Data Leakage and Detection of Guilty Agent
Rupesh Mishra, D.K. Chitre
Abstract— Organizations apply data or information security only in terms of protecting their network from intruders (e.g. hackers) but with
growing amount of sensitive data and rapid growth in the sizes of organizations (e.g. due to globalization), rise in number of data points
(machines and servers) and easier modes of communication, sometime accidental or even deliberate leakage of data from within the
organization has become a painful reality. This has lead to growing awareness about sensitive data security in general and about outbound
content management in particular.
Index Terms— Allocation strategies, Data distribution, Data leakage, Data privacy, Fake records, Guilty agent, Leakage Model.
—————————— ——————————
1 INTRODUCTION
D
ATA leakage is the unauthorized transmission of data or
information from within an organization to an external
destination or recipient. This may be electronic, or may
be via a physical method [1]. Data Leakage is synonymous
with the term Information Leakage. Here unauthorized does
not actually mean intentional or malicious. Even unintentional
or inadvertent data leakage is also unauthorized. The protection measure must be taken to secure these valuable data because if data is leaked from an organization and cybercriminals ―cash out‖ or sell this data for profit it costs organizations
money, damages the brand, image and destroys customer
trust.
In the course of doing business, sometimes sensitive data
must be handed over to supposedly trusted third parties for
some enhancement or operations, for example, a hospital may
give patient records to researchers who will devise new treatments. Similarly, a company may have partnerships with other companies that require sharing of customer data. Another
enterprise may outsource...