Case III Legitimate and intended data transfer: The
sensitive data is sent by a legitimate user intended for
legitimate purposes. In this paper, we assume that the data
owner is aware of legitimate data transfers and permits
such transfers. So the data owner can tell whether a piece
of sensitive data in the network traffic is a leak using
legitimate data transfer policies.