Open Access   Article Go Back

Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention

Shivakumara T1 , Rajshekhar M Patil2 , Muneshwara M S3

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-2 , Page no. 349-358, Feb-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.349358

Online published on Feb 28, 2019

Copyright © Shivakumara T, Rajshekhar M Patil, Muneshwara M S . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shivakumara T, Rajshekhar M Patil, Muneshwara M S, “Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.349-358, 2019.

MLA Style Citation: Shivakumara T, Rajshekhar M Patil, Muneshwara M S "Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention." International Journal of Computer Sciences and Engineering 7.2 (2019): 349-358.

APA Style Citation: Shivakumara T, Rajshekhar M Patil, Muneshwara M S, (2019). Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention. International Journal of Computer Sciences and Engineering, 7(2), 349-358.

BibTex Style Citation:
@article{T_2019,
author = {Shivakumara T, Rajshekhar M Patil, Muneshwara M S},
title = {Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {349-358},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3667},
doi = {https://doi.org/10.26438/ijcse/v7i2.349358}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.349358}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3667
TI - Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention
T2 - International Journal of Computer Sciences and Engineering
AU - Shivakumara T, Rajshekhar M Patil, Muneshwara M S
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 349-358
IS - 2
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
598 321 downloads 156 downloads
  
  
           

Abstract

Today’s world needs most of the things would be automated, the machine would be able to do itself everything by its own, from initiation of job to till the decision-making capabilities. Similarly the Security of the data needs the automated, self-decision and self-protective proactive mechanisms. Since, the existing tools and mechanisms are semi-automated still it needs the human intervention to update and configure the security layers and features. This paper gives the summarized view of the existing work carried out so far in the area of data security – data leakage detection and prevention.

Key-Words / Index Term

Data, Detection, Dynamic, Leakage, Prevention, Protection, Sensitive, Self-protective, Self-configurable

References

[1] Carlie Carlett, et. Al, “A Scientific Research and Development Approach to Cyber Security”, report submitted to Department of Energy, Dec 2008.
[2] Eric Yuan, et. Al, “A Systematic Survey of Self-Protecting Software Systems”, ACM, 1539-9087/2010/03-ART39.
[3] Neeraj Kumar, et. Al, “Detection of Data Leakage in Cloud Computing Environment”, Sixth International Conference on Computational Intelligence and Communication Networks, 978-1-4799-6929-6/2014,IEEE
[4] Marco Pistoia Omer Tripp, et. Al.,” Labyrinth: Visually Configurable Data-leakage Detection in Mobile Applications”, 16th IEEE International Conference on Mobile Data Management, 2015.
[5] Sherry Zhu, An Efficient Data Leakage Prevention Framework for Semiconductor Industry, Proceedings of the 2016 IEEE IEEM, 978-1-5090-3665-3/16/$31.00 ©2016 IEEE
[6] Becker et. Al., Real-Time Data Leakage Prevention and Reporting, 21st September 2017, US Patent publication No. US 2017/0270310 A1
[7] Min-JiSeo, et. Al., An advanced data leakage detection system analyzing relations between data leak activity, International journal of Applied Engineering Research ISSN 0973-4562 Volume 12, No.21,2017, pp 11546-11554
[8] Neha Ramteke, et. Al., Review paper on prevention of data leaks using 3DES Encryption, International journal of innovations & advancement in computer science, IJIACS, ISSN 2347-8616, Vol 6, Issue 11, Nov 2017.
[9] YavuzCanbay, A Turkish language based data leakage prevention system, 2017 5th International Symposium on Digital Forensic and Security (ISDFS), 978-1-5090-5835-8/17/$31.00 ©2017 IEEE
[10] Sarker T. Ahmed Rumee, et. Al., “MirrorDroid :A Framework to Detect Sensitive Information Leakage in Android by Duplicate Program Execution”, 978-1-5090-4780-2/17, IEEE, 2017
[11] Michael D Nelson, Data Leak Protection, 10 May 2018, US Patent Publication, us 2018/0131674 A1
[12] Shivakumara T, et. Al, “To incorporate value-added security features into current data for outsourcing cloud data applications through Secured Access Control and Assured Deletion”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 7, Issue 3, May-June 2018 , ISSN 2278-6856