0% found this document useful (0 votes)
23 views

C C C C: Module 1:data Allocation Module

The document describes a data security system with 4 modules: 1) A data allocation module that distributes data from a distributor to agents and detects if data is found in unauthorized places. 2) A fake object generation module that generates fake objects to include with distributed data to trace leaks. 3) An optimization module that finds the probability of which agents are guilty of leaks and traces the guilty agent. 4) A data distribution module that detects data leaks, traces guilty agents, restricts further leaks, and resets passwords.

Uploaded by

Alka Kumari
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

C C C C: Module 1:data Allocation Module

The document describes a data security system with 4 modules: 1) A data allocation module that distributes data from a distributor to agents and detects if data is found in unauthorized places. 2) A fake object generation module that generates fake objects to include with distributed data to trace leaks. 3) An optimization module that finds the probability of which agents are guilty of leaks and traces the guilty agent. 4) A data distribution module that detects data leaks, traces guilty agents, restricts further leaks, and resets passwords.

Uploaded by

Alka Kumari
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Module 1:Data allocation module

Sends the data...

Distributor

Agent 1

Agent 2

Receives data from the distributer

Agent n

2: Search req. data from datawarehouse 3: Insertion of fake object 7: finds out agents with the leaked data 8: traces the guilty agent 9: probability ditribution of data leakage

5: login using password 11: Reset password 12: Data leakage restricted

4: Sends data with invoice 10: Send the changed pwd Distributer 1: Request for data 6: finds data in unauthorised place

Agent

Target

Module 2: Fake object generation Generation of fake object from the data

Generation of fake object using e-random & e-optimal algo.

Distributor1 Requests for data sends data inclusive of fake object

Agent

Module 3: Optimisation module Traces guilty agent

Distributor 2

Agentt

possesses leaked data

Agent2

Target 3

find the probability of guilty agents

Agent x

Module 4: Data distribution module

finds the likelihood of leakage

Distributor8

detection of leakage

target8

Guilty Agent Traces guilty agent

Distributer

Agent

Target

Request for data Search req. data from datawarehouse

Insertion of fake object Sends data with invoice login using password

finds data in unauthorised place

finds out agents with the leaked data

traces the guilty agent

probability ditribution of data leakage

Send the changed pwd Reset password

Data leakage restricted

You might also like