Main Reference PaperData Leakage Detection, IEEE Transactions on Knowledge and Data Engineering, January 2011
  • The model proposed in this paper is relatively simple, possibly captures the essential trade-offs. The algorithms presented implement a variety of data distribution strategies that can improve the distributor’s chances of identifying a leaker.It demonstrates that distributing objects judiciously can make a significant difference in identifying guilty agents, especially in cases where there is large overlap in the data that agents must receive.

+ Description
  • The model proposed in this paper is relatively simple, possibly captures the essential trade-offs. The algorithms presented implement a variety of data distribution strategies that can improve the distributor’s chances of identifying a leaker.It demonstrates that distributing objects judiciously can make a significant difference in identifying guilty agents, especially in cases where there is large overlap in the data that agents must receive.

  • To detect the leakage of distributor’s sensitive data by agents, and if possible to identify the agent that leaked the data.

  • To propose data allocation strategies (across the agents) that improves the probability of identifying leakages.

+ Aim & Objectives
  • To detect the leakage of distributor’s sensitive data by agents, and if possible to identify the agent that leaked the data.

  • To propose data allocation strategies (across the agents) that improves the probability of identifying leakages.

  • The paper proposes one contribution method that is optimization technique to investigates the agent and capture the leakage scenarios that is analysis the reason for data leakage. This Optimization Technique is used in the distributor’s data allocation to agents has one constraint and one objective.

+ Contribution
  • The paper proposes one contribution method that is optimization technique to investigates the agent and capture the leakage scenarios that is analysis the reason for data leakage. This Optimization Technique is used in the distributor’s data allocation to agents has one constraint and one objective.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

+ Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-Depending on the complexity of the project and requirements.

+ Order To Delivery
  • No Readymade Projects-Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.