Detection of Guilt Model for Data Leakage

Nowadays the data are distributed for the business purposes through trusted agents. There is a chance for leakage of data and can be identified in unauthorized places. The probability of the leaked information came from one or additional agents should be assessed by the distributor, as hostile having been severally gathered by different means. In this paper we propose information allocation ways (across the agents) that improve the likelihood of distinguishing leakages. These ways do not think about alterations of the free information (e.g., watermarks). In some cases, we will additionally inject “realistic but fake” information records to further improve our possibilities of detection escape and distinguishing the problem.

[1]  W. J. Dowling,et al.  Watermarking digital images for copyright protection , 1996 .

[2]  Peter Buneman,et al.  Provenance in databases , 2009, SIGMOD '07.

[3]  Sabrina De Capitani di Vimercati,et al.  An algebra for composing access control policies , 2002, TSEC.

[4]  Rajeev Motwani,et al.  Towards robustness in query auditing , 2006, VLDB.

[5]  Hector Garcia-Molina,et al.  Privacy, Preservation and Performance: The 3 P's of Distributed Data Management , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.

[6]  Sushil Jajodia,et al.  Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.

[7]  Sushil Jajodia,et al.  Flexible support for multiple access control policies , 2001, TODS.

[8]  Rakesh Agrawal,et al.  Watermarking Relational Databases , 2002, Very Large Data Bases Conference.

[9]  Jianmin Wang,et al.  An Improved Algorithm to Watermark Numeric Relational Data , 2005, WISA.

[10]  V. Vianu,et al.  Edinburgh Why and Where: A Characterization of Data Provenance , 2017 .

[11]  Radu Sion,et al.  Rights protection for relational data , 2003, IEEE Transactions on Knowledge and Data Engineering.

[12]  Richard Fromm,et al.  Digital Music Distribution and Audio Watermarking , 2007 .

[13]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[14]  Jennifer Widom,et al.  Lineage tracing for general data warehouse transformations , 2003, The VLDB Journal.