Open Access   Article Go Back

Data Leakage Detection and Prevention of Confidential Data

Shubhangi G. Dhawase1 , Bhagyashri J. Chaudhari2 , Neha S. Kolambe3 , Poonam S. Masare4

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 213-218, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.213218

Online published on Jun 30, 2018

Copyright © Shubhangi G. Dhawase, Bhagyashri J. Chaudhari, Neha S. Kolambe, Poonam S. Masare . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shubhangi G. Dhawase, Bhagyashri J. Chaudhari, Neha S. Kolambe, Poonam S. Masare, “Data Leakage Detection and Prevention of Confidential Data,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.213-218, 2018.

MLA Style Citation: Shubhangi G. Dhawase, Bhagyashri J. Chaudhari, Neha S. Kolambe, Poonam S. Masare "Data Leakage Detection and Prevention of Confidential Data." International Journal of Computer Sciences and Engineering 6.6 (2018): 213-218.

APA Style Citation: Shubhangi G. Dhawase, Bhagyashri J. Chaudhari, Neha S. Kolambe, Poonam S. Masare, (2018). Data Leakage Detection and Prevention of Confidential Data. International Journal of Computer Sciences and Engineering, 6(6), 213-218.

BibTex Style Citation:
@article{Dhawase_2018,
author = {Shubhangi G. Dhawase, Bhagyashri J. Chaudhari, Neha S. Kolambe, Poonam S. Masare},
title = {Data Leakage Detection and Prevention of Confidential Data},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {213-218},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2166},
doi = {https://doi.org/10.26438/ijcse/v6i6.213218}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.213218}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2166
TI - Data Leakage Detection and Prevention of Confidential Data
T2 - International Journal of Computer Sciences and Engineering
AU - Shubhangi G. Dhawase, Bhagyashri J. Chaudhari, Neha S. Kolambe, Poonam S. Masare
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 213-218
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
765 402 downloads 316 downloads
  
  
           

Abstract

Data leakage is big security threat to organization, when third party agent carried out data leakage. Perturbation method use for the detecting and preventing data leakage and also for assessing data third party agent. Firstly, watermarking techniques used for data leakage but in that techniques modification to original data take place. To overcome this disadvantage data allocation strategies is used. It improve feasibility of finding guilt agent. Data based on sample request and explicit request using allocation strategies allocate by the distributor to detect the agent. Fake object are given with original data. If one or more fake object is leaked, then distributor detect the leakage by the agent was guilty. So, perturbation is efficient technique handle data leakage and also make less sensitive to data before handle to agent.

Key-Words / Index Term

Agent, Distributor, Perturbation, Detection and Fake Object

References

[1] XiaokuiShu, Danfeng Yao and Elisa Bertino, “Privacy-Preserving Detection of Sensitive Data Exposure”, IEEE Transactions on Information Forensics and Security, 1092-1103.
[2] XiaokuiShu and Jing Zhang, Danfeng Daphne Yao and Wu Chun Feng, “Fast Detection of Transformed Data Leaks”, IEEE Transactions on Information Forensics and Security, 528-542.
[3] Michael Backes ,Niklas Grimm and Aniket Kate, “Data Lineage In Malicious Enviornments”, IEEE Transactions on Dependable and Secure Computing, 178-191.
[4] P. Papadimitriou, H. Garcia-Molina, “Data Leakage Detection”, IEEE Transactions On Knowledge And Data Engineering, 51-63.
[5] SubhashiniPeneti and B. Padmaja Rani, “Data Leakage Prevention System With Timestamps”, International Conference on Information Communication and Embedded Systems, 1-6.
[6] Gilad Katz, Yuval Elovici, and BrachaShapira, “CoBAn: A context based model for data leakage prevention”, Information science on Springer.
[7] VeronikiStamatiKoromina and Christos Ilioudis, “Insider Threats in Corporate Environments: A Case Study for DLP”, in Proc. ACM.
[8] Yin Fan, Wang Yu, Wang Lina, YuRongwei, “A Trustworthiness-Based Distribution Model for Data Leakage Prevention”, Wuhan university journal of natural sciences,2010, Vol.15 No.3, 205-209.
[9] K. Borders, E. V. Weele, B. Lau and A. Prakash, “Protecting Confidential Data on Personal Computers
with Storage Capsules”, 18th USENIX Security Symposium, 2009.
[10] Jason Croft, Matthew Caesar, Xin Liu, and Wenjuan Gong, “Towards practical avoidance of information leakage in enterprise networks”, International Journal of Distributed Networks,10 November 2011.
[11] P.Buneman, S.Khanna, and W.C.Tan, “Why and Where: A Charaterization of Data provenance”, Proc.Eighth Int’l Conf. Database Theory(ICDT ‘01’),J.V. den Bussche and V.Vianu,eds.,pp.316-330,Jan.2001
[12] P.Buneman and W.C.Tan, “Provenence in Databases”, Proc ACM SIGMOD, pp.1171-1173,2007
[13] Y.Cui and J.Widom, “Lineage Tracing For General Data Warehouse Transformations”, The VLDB J.vol.12,pp.41-58,2003.
[14] J.J.K.O.Ruanaidh, W.J.Dowling, and F.M.Boland, “Watermarking Digital Images For Copyright Protection”, IEE Proc. Vision, Signal and Image Processing,vol.143,no.4,pp.250-256,1996.
[15] F.Hartung and B.Girod, “Watermarking of Uncompressed and Compressed Video”, Signal Processing, vol.66, no.3,pp.283-301,1998.
[16] S.Czerwinski, R.Fromm,and T.Hodes, “Digital Music Distribution and Audio watermarking”, http://www.Scientificcommons.org/43025658,2007.
[17] S.Jajodia, P.Samarati, M.L.Sapino,and V.S. Subrahmanian, “Flexible Support For Multiple Access ControlPolicies”, ACM Trans. Database Systems vol.26.no.2.pp.214-260,2001.
[18] P.Bonatti, S.D.C.di Vimercati,and P.Samarati, “An Algebra For Composing Access Control Policies”, ACM Trans. Information and system Security,vol.5,no.1,pp.1-35, 2002.
[19] L. Sweeney, “Achieving K-Anonymity Privacy
Protection Using Generalization and Suppression”, http://en.Scientificcommons.org/43196131, 2002.
[20] R. Sion, M. Atallah, and S. Prabhakar, “Rights Protection for Relational Data”, Proc. ACM SIGMOD, pp. 98-109, 2003.
[21] Ensaf Hussein, Mohamed A. Belal, “Digital Watermarking Techniques, Applications and Attacks Applied to Digital Media: A Survey”, IJERT, ISSN: 2278-0118, Vol. 1 Issue 7, September2012.
[22] Sandip A. Kale, Prof. S.V.Kulkarni, “Data Leakage Detection”, International Journal of Advanced Research in Computer and Communication Engineering, ISSN: 2278-1021, Vol. 1, Issue 9, November 2012.
[23] Upasana Yadav, J.P.Sharma, Dinesh Sharma, Purnima K. Sharma, “Different Watermarking Techniques & its Applications: A Review”, IJSER, ISSN 2229-5518, Volume 5, Issue 4, April-2014.
[24] Cox, I.J.; Miller, M.L.; Bloom, J.A., “Digital Watermarking”, Morgan Kaufmann, 2001.
[25] Prabhishek Singh, R S Chadha, “A Survey of Digital Watermarking Techniques, Applications and Attacks”, IJEIT, ISSN: 2277-3754, Vol. 2 Issue 9, March-2013.