A Study of Data Allocation Problem for Guilt Model Assessment in Data Leakage Detection Using Clouding Computing
نویسنده
چکیده
In the virtual and widely distributed network, the process of handover sensitive data from the distributor to the trusted third parties always occurs regularly in this modern world. It needs to safeguard the security and durability of service based on the demand of usersA data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases, we can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party. This paper presents a data leakage detection system using various allocation strategies and which assess the likelihood that the leaked data came from one or more agents. For secure transactions, allowing only authorized users to access sensitive data through access control policies shall prevent data leakage by sharing information only with trusted parties and also the data should be detected from leaking by means of adding fake record`s in the data set and which improves probability of identifying leakages in the system. Then, finally it is decided to implement this mechanism on a cloud server.
منابع مشابه
Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملData Flow for Effective Data Leakage Prevention using Elliptic Curve Digital Signature Algorithm
Sensitive data is leaked in software firm, government sectors and also from the web. To prevent this leakage, data allocation strategies are used. Data allocation Strategy improves the probability of identifying leakages. The current model in leakage detection is handled by watermarking. Watermarks can be useful in some of the cases, but it again, modifies of the original data. If the recipient...
متن کاملIntegrated modeling and solving the resource allocation problem and task scheduling in the cloud computing environment
Cloud computing is considered to be a new service provider technology for users and businesses. However, the cloud environment is facing a number of challenges. Resource allocation in a way that is optimum for users and cloud providers is difficult because of lack of data sharing between them. On the other hand, job scheduling is a basic issue and at the same time a big challenge in reaching hi...
متن کاملRelational Data Leakage Detection using Fake Object and Allocation Strategies
In today’s world, there is need of many companies to outsource their sure business processes (e.g. marketing ,human resources) and related activities to a third party like their service suppliers. In many cases the service supplier desires access to the company’s confidential information like customer data, bank details to hold out their services. And for most corporations the amount of sensiti...
متن کاملObtaining a possible allocation in the bankruptcy model using the Shapley value
Data envelopment analysis (DEA) is an effective tool for supporting decision-makers to assess bankruptcy, uncertainty concepts including intervals, and game theory. The bankruptcy problem with the qualitative parameters is an economic problem under uncertainty. Accordingly, we combine the concepts of the DEA game theory and uncertain models as interval linear programming (ILP), which can be app...
متن کامل