IMPEMENTATION OF DATA WATCHER IN DATA LEAKAGE DETECTION SYSTEM

Authors

  • N. P. Jagtap SSBT’s COET, Bambhori, Jalgaon
  • S. J. Patil SSBT’s COET, Bambhori, Jalgaon
  • A. K. Bhavsar SSBT’s COET, Bambhori, Jalgaon

DOI:

https://doi.org/10.24297/ijct.v3i1a.2730

Keywords:

Confidential data, Fake Data, Data Request, Guilt Model

Abstract

Now days, every company is facing data leakage. That is very serious problem faced by company. An owner of enterprise has given confidential data to its employee but most of the time employee leaks the data. That leak data found in illegal place such as on the web of comparator enterprise or on laptop of employee of comparator enterprise or the owner of Comparators Company’s laptop. It May or may not be observed by owner. Leak data may be basic code or design provision, cost lists, rational property and copy rights data, trade secrets, forecasts and budgets. In this case the data leaked out it leaves the company goes in undefended the authority of the corporation. This uninhibited data leakage puts business in a back in position. To find the solution on this problem we develop two models. First, when any employee of enterprise access confidential data without the consent of owner in that case ,we developed data watcher model to identifying data leaker and suppose employee given data outside the enterprise for that we devolved second model for assessing the “guilt†of agents. Guilt model are used to improve the probability of identifying guilty third parties.

Downloads

Download data is not yet available.

Author Biographies

N. P. Jagtap, SSBT’s COET, Bambhori, Jalgaon

Asst. ProfessorDepartment of Information technology

S. J. Patil, SSBT’s COET, Bambhori, Jalgaon

Asst. Professor Department of Information technology

A. K. Bhavsar, SSBT’s COET, Bambhori, Jalgaon

Associate Professor Department of Information technology

Downloads

Published

2012-08-01

How to Cite

Jagtap, N. P., Patil, S. J., & Bhavsar, A. K. (2012). IMPEMENTATION OF DATA WATCHER IN DATA LEAKAGE DETECTION SYSTEM. INTERNATIONAL JOURNAL OF COMPUTERS &Amp; TECHNOLOGY, 3(1), 44–47. https://doi.org/10.24297/ijct.v3i1a.2730

Issue

Section

Research Articles

Most read articles by the same author(s)