Survey on Data Leak Detection Algorithms
M.A. Thrupthy1 , J. George2 , S.M. Nisha3 , S. Lemya4
Section:Survey Paper, Product Type: Journal Paper
Volume-4 ,
Issue-11 , Page no. 116-120, Nov-2016
Online published on Nov 29, 2016
Copyright © M.A. Thrupthy , J. George , S.M. Nisha, S. Lemya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: M.A. Thrupthy , J. George , S.M. Nisha, S. Lemya , “Survey on Data Leak Detection Algorithms,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.11, pp.116-120, 2016.
MLA Style Citation: M.A. Thrupthy , J. George , S.M. Nisha, S. Lemya "Survey on Data Leak Detection Algorithms." International Journal of Computer Sciences and Engineering 4.11 (2016): 116-120.
APA Style Citation: M.A. Thrupthy , J. George , S.M. Nisha, S. Lemya , (2016). Survey on Data Leak Detection Algorithms. International Journal of Computer Sciences and Engineering, 4(11), 116-120.
BibTex Style Citation:
@article{Thrupthy_2016,
author = {M.A. Thrupthy , J. George , S.M. Nisha, S. Lemya },
title = {Survey on Data Leak Detection Algorithms},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2016},
volume = {4},
Issue = {11},
month = {11},
year = {2016},
issn = {2347-2693},
pages = {116-120},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1118},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1118
TI - Survey on Data Leak Detection Algorithms
T2 - International Journal of Computer Sciences and Engineering
AU - M.A. Thrupthy , J. George , S.M. Nisha, S. Lemya
PY - 2016
DA - 2016/11/29
PB - IJCSE, Indore, INDIA
SP - 116-120
IS - 11
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
1633 | 1376 downloads | 1436 downloads |
Abstract
The data leak detection plays a major role in organizational industry. The data leak poses serious threat to online social Medias, sensitive datas and so on. We take two papers for this survey. Both of them belong to the area of information forensic and security. In first survey, paper develops a model [PPDLD] the model is based on fuzzy finger print method. The goal of this paper is to generate special type of digest is called fuzzy fingerprint. Rabin finger print algorithm is introduced here just for sampling. A filtering method is used during the digestion process. In second survey, paper deals the fast detection of transformed data leak. This paper suggests a preserving method based on alignment algorithm. The paper aim to detect long and inexact leak patterns from sensitive data and network. Detection is based on comparable sampling algorithm.
Key-Words / Index Term
Leak Detection; Fuzzy finger print random generation; Rabin karp algorithm; Subsequence preserving; Alignment algorithm
References
[1] X. Shu and D. Yao, �Data leak detection as a service,� in Proc. 8th Int. Conf. Secur. Privacy Commun. Netw., 2012, pp. 222�240
[2] Robert riggo , Abbas Bradi , Davit Harutyunyan,Tinku Rasheed ,Member,IEEE,and toufik Ahmed �scheduling Wireless Virtual Networks Function� IEEE transactions on network and service management, VOL. 13, NO.2, MARCH 2016
[3] X. Shu, D. Yao, and E. Bertino, �Privacy-preserving detection of sensitive data exposure,� IEEE Trans. Inf. Forensics Security, vol. 10, no. 5, pp. 1092�1103, May 2015.
[4] F. Liu, X. Shu, D. Yao, and A. R. Butt, �Privacy-preserving scanning of big content for sensitive data exposure with Map Reduce,� in Proc. 5th ACM Conf. Data Appl. Secur. Privacy (CODASPY), 2015, pp. 195�206.
[5] M. O. Rabin, �Fingerprinting by random polynomials,� Dept. Math., Hebrew Univ. Jerusalem, Jerusalem, Israel, Tech. Rep. TR-15-81, 1981.
[6] A. Z. Broder, �Some applications of Rabin�s fingerprinting method,� in Sequences II. New York, NY, USA: Springer-Verlag, 1993, pp. 143�152.
[7] H. A. Kholidy, F. Baiardi, and S. Hariri, �DDSGA: A data-driven semi-global alignment approach for detecting masquerade attacks,� IEEE Trans. Dependable Secure Comput., vol. 12, no. 2, pp. 164�178, Mar./Apr. 2015.
[8] D. Ficara, G. Antichi, A. Di Pietro, S. Giordano, G. Procissi, and F. Vitucci, �Sampling techniques to accelerate pattern matching in network intrusion detection systems,� in Proc. IEEE Int. Conf. Commun., May 2010, pp. 1�5.
[9] Chinar Bhandari1, Dr. Srinivas Narasim Kini �A Survey Paper on Data Leak Detection using Semi Honest Provider Framework� International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 Impact Factor (2014): 5.611
[10] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, �Fuzzy keyword search over encrypted data in cloud computing,� in Proc. 29th IEEEConf. Comput. Commun., Mar. 2010, pp. 1�5.
[11] Xiaokui Shu, Jing Zhang, Danfeng (Daphne) Yao, and Wu-Chun Feng, Senior Member, IEEE �Fast Detection of Transformed Data Leaks� IEEE transactions on information forensics and security, VOL. 11, NO. 3, MARCH 2016
[12] Ankit Tale, Mayuresh Gunjal,B.A,Ahire �Data Leak Detection Using Information Hiding Techniques� IJCSE, VOL. 2, NO. 3, MARCH 2014