%0 Journal Article %T Fraud Detection in Information Leakage %A Poonam Sahoo %A Kanchan Garud %A Sarika Kate %A Sharayu Padmane %J International Journal of Computer Technology and Applications %D 2012 %I Technopark Publications %X In the field of business, the owner having some crucial data may need to share it with third-parties. These trusted third-parties may use this data for their own benefit causing reputational and monetary damage to the ownerĄŻs company. If some of the shared data is discovered at some illegal place, it is quite possible that one or more third party agent is responsible for such information leakage.The owner must identify the leakage at the earliest and possibly the source of leakage. This paper presents two methods to handle such information leakage namely watermarking and Identifying Guilty agent using probability. %K Watermarking %K Fake records %K Guilty agent %K Leaked dataset %K sensitive data %K Probability of guilty agent %K Allocation strategies %K data privacy %K leakage model %U http://ijcta.com/documents/volumes/vol3issue2/ijcta2012030254.pdf