A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and found in an unauthorized place. The distributor must assess the likelihood that the leaked data came from Continue reading
Get Latest Final Year Computer Projects in your Email
Tag: Data Leakage Detection
A Location-Aware Architecture Supporting Intelligent Real-Time Mobile Applications
This dissertation presents LAISYC, a modular location-aware architecture for intelligent real-time mobile applications that is fully-implementable by third party mobile app developers and supports high-precision and high-accuracy Continue reading
Data Leakage Detection Using Cloud Computing
In the virtual and widely distributed network, the process of handover sensitive data from the distributor to the trusted third parties always occurs regularly in this modern world. It needs to safeguard the security and durability of service based on the Continue reading
Data Leakage Detection – 1
Perturbation is a very useful technique where the data is modified and made ‘less sensitive ́ before being handed to agents. For example, one can add random noise to certain attributes, or one can Continue reading
Data Leakage Detection – 2
This paper contains the results of implementation of Data Leakage Detection Model. Currently watermarking technology is being used for the data protection. But this technology doesn’t provide the complete security against Continue reading