Security Test by using F T M and Data Allocation Strategies on Leakage Detection

Authors

  • Pallavali Radha JNT University Anantapur
  • G. Sireesha St. Petere’s Engineering College

DOI:

https://doi.org/10.24297/ijct.v4i2b1.3227

Keywords:

Data leakage, Data privacy, Allocation strategies, security testing, Software security.

Abstract

The data distributors work is to give sensitive data to a set of presumably trusted third party agents.The data i.e., sent to these third parties are available on the unauthorized places like web and or some ones systems, due to data leakage. The distributor must know the way the data was leaked from one or more agents instead of as opposed to having been independently gathered by other means. Our new proposal on data allocation strategies will improve the probability of identifying leakages along with Security attacks typically result from unintended behaviors or invalid inputs.  Due to too many invalid inputs in the real world programs is labor intensive about security testing.The most desirable thing is to automate or partially automate security-testing process. In this paper we represented Predicate/ Transition nets approach for security tests automated generationby using formal threat models to detect the agents using allocation strategies without modifying the original data.The guilty agent is the one who leaks the distributed data. To detect guilty agents more effectively the idea is to distribute the data intelligently to agents based on sample data request and explicit data request. The fake object implementation algorithms will improve the distributor chance of detecting guilty agents.

Downloads

Download data is not yet available.

Author Biographies

Pallavali Radha, JNT University Anantapur

M. Tech student in CSE, VITS-PDTR

G. Sireesha, St. Petere’s Engineering College

Assistant Professor in CSE Department

Downloads

Published

2005-08-30

How to Cite

Radha, P., & Sireesha, G. (2005). Security Test by using F T M and Data Allocation Strategies on Leakage Detection. INTERNATIONAL JOURNAL OF COMPUTERS &Amp; TECHNOLOGY, 4(2), 393–400. https://doi.org/10.24297/ijct.v4i2b1.3227

Issue

Section

Research Articles