Authors :
Aditi Chaudhary; Chetna Gola; Manshi
Volume/Issue :
Volume 8 - 2023, Issue 5 - May
Google Scholar :
https://bit.ly/3TmGbDi
Scribd :
https://tinyurl.com/3at3z3uu
DOI :
https://doi.org/10.5281/zenodo.8347823
Abstract :
The issue of data leakage is more prevalent in
a cloud computing en- vironment. The data distributor
transfers such sensitive data to the agents and some of the
data gets leaked, the technique of finding a guilty agent
talked about here is through a probability distribution
model. The probability calculat- ed on the basis of the
number of file downloads from the distributors by the
agents is used in detection. To combat the leakage
scenario, several precaution- ary measures can be taken
out of which the technique of watermarking is dis- cussed
here.
Keywords :
Data leakage detection, guilty agent, probability distribution model, watermarking, watermarking techniques, Advanced Encryption Standard.
The issue of data leakage is more prevalent in
a cloud computing en- vironment. The data distributor
transfers such sensitive data to the agents and some of the
data gets leaked, the technique of finding a guilty agent
talked about here is through a probability distribution
model. The probability calculat- ed on the basis of the
number of file downloads from the distributors by the
agents is used in detection. To combat the leakage
scenario, several precaution- ary measures can be taken
out of which the technique of watermarking is dis- cussed
here.
Keywords :
Data leakage detection, guilty agent, probability distribution model, watermarking, watermarking techniques, Advanced Encryption Standard.