Open Access   Article Go Back

Detection of Sensitive Data Leakage for Privacy Preserving

R.J. Patil1 , Y.S. Borse2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-9 , Page no. 765-769, Sep-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i9.765769

Online published on Sep 30, 2018

Copyright © R.J. Patil, Y.S. Borse . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R.J. Patil, Y.S. Borse, “Detection of Sensitive Data Leakage for Privacy Preserving,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.765-769, 2018.

MLA Style Citation: R.J. Patil, Y.S. Borse "Detection of Sensitive Data Leakage for Privacy Preserving." International Journal of Computer Sciences and Engineering 6.9 (2018): 765-769.

APA Style Citation: R.J. Patil, Y.S. Borse, (2018). Detection of Sensitive Data Leakage for Privacy Preserving. International Journal of Computer Sciences and Engineering, 6(9), 765-769.

BibTex Style Citation:
@article{Patil_2018,
author = {R.J. Patil, Y.S. Borse},
title = {Detection of Sensitive Data Leakage for Privacy Preserving},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2018},
volume = {6},
Issue = {9},
month = {9},
year = {2018},
issn = {2347-2693},
pages = {765-769},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2941},
doi = {https://doi.org/10.26438/ijcse/v6i9.765769}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i9.765769}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2941
TI - Detection of Sensitive Data Leakage for Privacy Preserving
T2 - International Journal of Computer Sciences and Engineering
AU - R.J. Patil, Y.S. Borse
PY - 2018
DA - 2018/09/30
PB - IJCSE, Indore, INDIA
SP - 765-769
IS - 9
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
388 244 downloads 229 downloads
  
  
           

Abstract

According to Risk Base Security, during last few years leakage of sensitive data record has increased. Human mistake is one of the important reason for data exposure. There is an approach in which data is monitored during transmission to detect the inadvertent data leak cause by human mistakes. However it makes the detection process difficult. There is a need of method that support accurate detection without revealing sensitive data. In particular system, Human identity i,e fingerprint is applied to data file for authentication. It is the process in which original fingerprint matrix is compressed using novel down sampling technique. In the technique, original matrix is compressed by calculating arithmetic mean of the sum of the pixel values on each input row matrix to generate a unit input vector for artificial neural network. The fingerprint samples are matched using back propagation technique. The evaluation result shows improved accuracy and detection time.

Key-Words / Index Term

Data leakage, Downsampling, Backpropagation algorithm

References

[1] Xiaokui Shu, Danfeng Yao and Elisa Bertino, fellow," Privacy-Preserving Detection of Sensitive Data Exposure" IEEE Trans. on Information Forensics and Security, Vol. 10, No. 5,pp.1092-1103, May 2015.
[2] Liu F., Shu X., Yao D., and A. R. Butt, "Privacy-preserving scanning of big content for sensitive data exposure with MapReduce," in Proc. ACM Conference on Data Application Security and Privacy, pp.195-206, 2015.
[3] Jagtap V. and Mishra S.," Fast efficient artificial neural network for handwritten digit recognition," International Journal of Computer Science and Information Technologies, vol. 5, pp. 2302-2306., 2014.
[4] Hahn-Ming Lee, Chih-Ming Cheb, Tzong-Ching Huang "Learning improvement of back propagation algorithm by error saturation prevention method," Neurocomputing, November 2001, pp. 125-143.
[5] Lei Yu, Mohamed Laaraiedh, Stephane Avrillon, "Fingerprint localisation based on neural networks and ultra-wide band signals," IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Bilbao, pp. 184-189, 14-17 December 2011.
[6] Shu X. and Yao D., "Data leak detection as a service," in Proc. 8th Int. Conf. Secur.Privacy Commun. Netw"., pp. 222-240, 2012.
[7] K. Borders, E. V. Weele, B. Lau, and A. Prakash, "Protecting con_dential data on personal computers with storage capsules," in Proc. 18th USENIX Secur. Symp. , pp. 367-382 ,2009.
[8] A. Nadkarni and W. Enck, "Preventing accidental data disclosure in modern operating systems," in Proc. 20th ACM Conf. Comput. Commun. Secur., pp. 1029-1042, 2013.
[9] Risk Based Security. (Feb. 2017). Data Breach Quick- View: An Executive`s Guide to 2013 Data Breach Trends. [Online]. Available: https://www.riskbasedsecurity.com/reports /2016 DataBreachQuickView.pdf, accessed on Oct. 2017.