A COMPREHENSIVE STUDY AND COMPARISON OF VARIOUS METHODS ON DATA LEAKAGES
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Panagiotis Papadimitriou, “Data Leakage Detectionâ€, IEEE Transactions On Knowledge And Data Engineering, Vol. 23
P. Papadimitriou and H. Garcia-Molina, “Data leakage detectionâ€, Technical report, Stanford University, 2008.
Rakesh Agrawal, Jerry Kiernan, “Watermarking Relational Databasesâ€, IBM Almaden Research Center.
S. Czerwinski, R. Fromm, and T. Hodes, “Digital music distribution and audio watermarkingâ€.
J.J.K.O. Ruanaidh, W.J. Dowling, and F.M. Boland, “Watermarking Digital Images for Copyright Protection,†IEEE Proc. Vision, Signal and Image Processing, vol. 143, no. 4, pp. 250-256, 1996.
R. Sion, M. Atallah, and S. Prabhakar, “Rights Protection for Relational Data,†Proc. ACM SIGMOD, pp. 98-109, 2003.
Y. Li, V. Swarup, and S. Jajodia, “Fingerprinting Relational Databases: Schemes and Specialties,†IEEE Trans. Dependable and Secure Computing, vol. 2, no. 1, pp. 34-45, Jan.-Mar. 2005.
X. Shu and D. Yao. “Data Leak Detection as a Service†It was published in the “8th International Conference on Secure Privacy Communication Networkâ€2012.
F. Liu, X. Shu, D. Yao and A. R. Butt “Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with Map Reduce algorithmâ€. It was published in the “CODASPY ’15 Proceeding of the 5th ACM Conference on Data and Application Security and Privacyâ€. 2015.
R. Chen, B. C. M. Mohammed, B. C. Desai and K. Wang. “Privacy-Preserving Trajectory Data Publishing by Local Suppression†It was introduced by “Journal of Information Scienceâ€. 2013.
K. Borders and A. Prakash. “Quantifying Information Leaks in Outbound Web Traffic†It was published in IEEE Symposium on Security and Privacyâ€. 2009.
K. Borders, E. V. Weele, B. Lau, and A. Prakash. “Protecting Confidential Data on Personal Computers with Storage Capsules†18th USENIX Security Symposium. 2009.
Karjoth and M. Schunter. “A privacy policy model for enterprises†Computer Security Foundations Workshop. 2002.
Y. Jang, S. P. Chung, B. D. Payne, and W. Lee. “Gyrus: A framework for user-intent monitoring of text-based networked applications.†23rd USENIX Security Symposium.2014.
Bing Wang, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, “Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloudâ€, IEEE 2014.
B. Hauer, "Data and Information Leakage Prevention Within the Scope of Information Security," in IEEE Access, vol. 3, no. , pp. 2554-2565, 2015
Sandip A. Kale C, Prof.S.V. Kulkarni C, “Data Leakage Detection: A Surveyâ€, IOSR Journal of Computer Engineering (IOSRJCE) ISSN : 2278-0661 Volume 1, Issue 6 (July-Aug 2012), PP 32-35
Nikhil Chaware, Prachi Bapat, Rituja Kad, Archana Jadhav, S.M.Sangve, “Data Leakage Detectionâ€, International Journal of Scientific Engineering and Technology (ISSN : 2277-1581) Volume No.1, Issue No.6, pg : 272-273
Nikhil chaware, prachi bapat, rituja kad, archana jadhav, Prof.s.m.sangve, “Data leakage detectionâ€,Journal of information, knowledge and research in Computer engineering, Issn: 0975 – 6760, page 534-535
Ghagare Mahesh, Yadav Sujit, Kamble Snehal, Nangare Jairaj, Shewale Ramchandra, “Data Leakage Detectionâ€, International Research Journal of Engineering and Technology (IRJET), ISSN: 2395 -0056, Page 1056-1060.
Kumar, A. Goyal, A. Kumar, N. K. Chaudhary and S. Sowmya Kamath, "Comparative evaluation of algorithms for effective data leakage detection," 2013 IEEE Conference on Information & Communication Technologies, JeJu Island, 2013, pp. 177-182.
Rakesh Agrawal, Jerry Kiernan, “Watermarking Relational Databasesâ€, IBM Almaden Research Center.
S. Czerwinski, R. Fromm, and T. Hodes, â€Digital music distribution and audio watermarkingâ€.
J.J.K.O. Ruanaidh, W.J. Dowling, and F.M. Boland, “Watermarking Digital Images for Copyright Protection,†IEE Proc. Vision, Signal and Image Processing, vol. 143, no. 4, pp. 250-256, 1996.
R. Sion, M. Atallah, and S. Prabhakar, “Rights Protection for Relational Data,†Proc. ACM SIGMOD, pp. 98-109, 2003.