An Efficient Method to Discover Transformed Data Leak
S. Sindhuja1 , M. Valliammai2
Section:Review Paper, Product Type: Journal Paper
Volume-07 ,
Issue-04 , Page no. 261-263, Feb-2019
Online published on Feb 28, 2019
Copyright © S. Sindhuja, M. Valliammai . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: S. Sindhuja, M. Valliammai, “An Efficient Method to Discover Transformed Data Leak,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.261-263, 2019.
MLA Style Citation: S. Sindhuja, M. Valliammai "An Efficient Method to Discover Transformed Data Leak." International Journal of Computer Sciences and Engineering 07.04 (2019): 261-263.
APA Style Citation: S. Sindhuja, M. Valliammai, (2019). An Efficient Method to Discover Transformed Data Leak. International Journal of Computer Sciences and Engineering, 07(04), 261-263.
BibTex Style Citation:
@article{Sindhuja_2019,
author = {S. Sindhuja, M. Valliammai},
title = {An Efficient Method to Discover Transformed Data Leak},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {07},
Issue = {04},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {261-263},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=767},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=767
TI - An Efficient Method to Discover Transformed Data Leak
T2 - International Journal of Computer Sciences and Engineering
AU - S. Sindhuja, M. Valliammai
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 261-263
IS - 04
VL - 07
SN - 2347-2693
ER -
Abstract
The computer system poses a serious threat to the organisational security due to the leak of sensitive data. According to the report of risk based security (RBS), the leaked sensitive data records has increased dramatically during last few years, (i.e.) from 412 million in 2012 to 822 million in 2013. These are caused only by the lack of proper encryption on files and documents and by human errors these causes data loss. Organisation has the responsibility of screening the content which is stored in the system as sensitive data. In this paper, we utilize two techniques, which are levenshtein-distance technique and luecene search framework. These two helps to detect the leakage of data and this technique is used for screening the data which are outsourced and it also keep an track of, who is transferring the data.
Key-Words / Index Term
Sensitive data, Data leak, Data detection, levenshtein-distance, luecene search
References
[1] X. Shu, D. Yao, and E. Bertino, “Privacy preserving detection of sensitive data exposure,” IEEE Trans. Inf. ForensicsSecurity, vol. 10, no. 5, pp. 1092–1103, May 2015.
[2] K. Borders and A. Prakash, “Quantifying information leaks in outbound Web traffic,” in Proc. 30th IEEESymp. Secur. Privacy (SP), May 2009, pp. 129–140.
[3] S. Jha, L. Kruger, and V. Shmatikov, “Towards practical privacy for genomic computation,” in Proc. IEEE Symp.Secur.Privacy, May 2008, pp. 216–230.
[4] S. Kumar, B. Chandrasekaran, J. Turner, and G. Varghese, “Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia,” in Proc. 3rd ACM/IEEE Symp. Archit. Netw.Commun. Syst. (ANCS), 2007, pp. 155–164.