UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 6 | June 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 11 Issue 5
May-2024
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIRGG06006


Registration ID:
539429

Page Number

30-34

Share This Article


Jetir RMS

Title

PREVENTIONOFDATALEAKERSINSPARTIALDOMAIN

Abstract

The enterprise may outsource its data processing, and data must be given to various other companies. We call the owner of the original data the distributor and the supposedly trusted third parties the agents. And Our goal is to detect when the distributor’s sensitive data has been leaked by agents, or Other third-party and if possible to identify the agent that leaked the data. The project considers applications where the original sensitive data cannot be perturbed. Perturbation is very high and a very useful technique where the data is modified and made “low sensitive” before being handed to agents. For example, one ore more can add random noise to certain attributes, or one can replace exact values by ranges. However, in some cases it is important not to alter the original distributor’s data. For this project we are study unobtrusive techniques for detecting leakage of a set of objects or records in the data. Specifically, we study the following scenario: After giving the set of objects to agents, the distributor discoverssomeofthosesameobjectsinanunauthorizedplace.thispointthedistributorscanassessthe likelihood that the leaked data came from one or more agents, as opposed having been independently gathered by Other mean. Finally, we also consider the option of adding “fake” or" Not real" objects to the distributed set. Such objects do not correspond to real entities but appear realistic to the agents. This Project is developed in Asp.net as front end and back end as SQL server.

Key Words

SymmetricKey,FakeObjects,DataDistributor,UnobtrusiveTechniques

Cite This Article

"PREVENTIONOFDATALEAKERSINSPARTIALDOMAIN", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.11, Issue 5, page no.30-34, May-2024, Available :http://www.jetir.org/papers/JETIRGG06006.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"PREVENTIONOFDATALEAKERSINSPARTIALDOMAIN", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.11, Issue 5, page no. pp30-34, May-2024, Available at : http://www.jetir.org/papers/JETIRGG06006.pdf

Publication Details

Published Paper ID: JETIRGG06006
Registration ID: 539429
Published In: Volume 11 | Issue 5 | Year May-2024
DOI (Digital Object Identifier):
Page No: 30-34
Country: -, -, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00017

Print This Page

Current Call For Paper

Jetir RMS