Open Access   Article Go Back

An Efficient Method to Discover Transformed Data Leak

S. Sindhuja1 , M. Valliammai2

Section:Review Paper, Product Type: Journal Paper
Volume-07 , Issue-04 , Page no. 261-263, Feb-2019

Online published on Feb 28, 2019

Copyright © S. Sindhuja, M. Valliammai . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Sindhuja, M. Valliammai, “An Efficient Method to Discover Transformed Data Leak,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.261-263, 2019.

MLA Style Citation: S. Sindhuja, M. Valliammai "An Efficient Method to Discover Transformed Data Leak." International Journal of Computer Sciences and Engineering 07.04 (2019): 261-263.

APA Style Citation: S. Sindhuja, M. Valliammai, (2019). An Efficient Method to Discover Transformed Data Leak. International Journal of Computer Sciences and Engineering, 07(04), 261-263.

BibTex Style Citation:
@article{Sindhuja_2019,
author = {S. Sindhuja, M. Valliammai},
title = {An Efficient Method to Discover Transformed Data Leak},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {07},
Issue = {04},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {261-263},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=767},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=767
TI - An Efficient Method to Discover Transformed Data Leak
T2 - International Journal of Computer Sciences and Engineering
AU - S. Sindhuja, M. Valliammai
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 261-263
IS - 04
VL - 07
SN - 2347-2693
ER -

           

Abstract

The computer system poses a serious threat to the organisational security due to the leak of sensitive data. According to the report of risk based security (RBS), the leaked sensitive data records has increased dramatically during last few years, (i.e.) from 412 million in 2012 to 822 million in 2013. These are caused only by the lack of proper encryption on files and documents and by human errors these causes data loss. Organisation has the responsibility of screening the content which is stored in the system as sensitive data. In this paper, we utilize two techniques, which are levenshtein-distance technique and luecene search framework. These two helps to detect the leakage of data and this technique is used for screening the data which are outsourced and it also keep an track of, who is transferring the data.

Key-Words / Index Term

Sensitive data, Data leak, Data detection, levenshtein-distance, luecene search

References

[1] X. Shu, D. Yao, and E. Bertino, “Privacy preserving detection of sensitive data exposure,” IEEE Trans. Inf. ForensicsSecurity, vol. 10, no. 5, pp. 1092–1103, May 2015.
[2] K. Borders and A. Prakash, “Quantifying information leaks in outbound Web traffic,” in Proc. 30th IEEESymp. Secur. Privacy (SP), May 2009, pp. 129–140.
[3] S. Jha, L. Kruger, and V. Shmatikov, “Towards practical privacy for genomic computation,” in Proc. IEEE Symp.Secur.Privacy, May 2008, pp. 216–230.
[4] S. Kumar, B. Chandrasekaran, J. Turner, and G. Varghese, “Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia,” in Proc. 3rd ACM/IEEE Symp. Archit. Netw.Commun. Syst. (ANCS), 2007, pp. 155–164.