C C C C: Module 1:data Allocation Module
C C C C: Module 1:data Allocation Module
Distributor
Agent 1
Agent 2
Agent n
2: Search req. data from datawarehouse 3: Insertion of fake object 7: finds out agents with the leaked data 8: traces the guilty agent 9: probability ditribution of data leakage
5: login using password 11: Reset password 12: Data leakage restricted
4: Sends data with invoice 10: Send the changed pwd Distributer 1: Request for data 6: finds data in unauthorised place
Agent
Target
Module 2: Fake object generation Generation of fake object from the data
Agent
Distributor 2
Agentt
Agent2
Target 3
Agent x
Distributor8
detection of leakage
target8
Distributer
Agent
Target
Insertion of fake object Sends data with invoice login using password