...
【24h】

Data Leakage Detection

机译:数据泄漏检测

获取原文
获取原文并翻译 | 示例
           

摘要

We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and found in an unauthorized place (e.g., on the web or somebody''s laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases, we can also inject ȁC;realistic but fakeȁD; data records to further improve our chances of detecting leakage and identifying the guilty party.
机译:我们研究以下问题:数据分发者已将敏感数据提供给一组所谓的受信任代理(第三方)。一些数据被泄漏并在未经授权的地方(例如,在网络上或某人的笔记本电脑上)找到。分发者必须评估泄漏数据来自一个或多个代理的可能性,而不是通过其他方式独立收集的可能性。我们提出了数据分配策略(跨代理),以提高识别泄漏的可能性。这些方法不依赖于已发布数据的更改(例如,水印)。在某些情况下,我们还可以注入ȁC;真实但假的ȁD;数据记录,以进一步提高我们发现泄漏和识别有罪当事人的机会。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号