A COMPREHENSIVE STUDY AND COMPARISON OF VARIOUS METHODS ON DATA LEAKAGES

Main Article Content

B Raja Koti
Dr. GVS Raj Kumar
Dr. Y. Srinivas

Abstract

Data security is an important asset for any organization. Mainly data leakages will take place when a system is premeditated such that some vital information about the organization is revealed to unauthorized parties. In addition, during the time of data sharing, there may be huge chances for the data exposure, leading to leakage or unauthorized modifications. The protection and prevention of sensitive data from leakages is a vital issue to every organization, as the data is the most valuable source for any organization. Many authors have developed and presented their views of safeguarding the data such that the vital information is not explored or leakage. In this article, a detailed survey many such recent innovations on data leakage techniques aimed at detecting data leakages are highlighted for the researchers to have further directions.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biography

B Raja Koti, GITAM University

Department of IT

References

Panagiotis Papadimitriou, “Data Leakage Detectionâ€, IEEE Transactions On Knowledge And Data Engineering, Vol. 23

P. Papadimitriou and H. Garcia-Molina, “Data leakage detectionâ€, Technical report, Stanford University, 2008.

Rakesh Agrawal, Jerry Kiernan, “Watermarking Relational Databasesâ€, IBM Almaden Research Center.

S. Czerwinski, R. Fromm, and T. Hodes, “Digital music distribution and audio watermarkingâ€.

J.J.K.O. Ruanaidh, W.J. Dowling, and F.M. Boland, “Watermarking Digital Images for Copyright Protection,†IEEE Proc. Vision, Signal and Image Processing, vol. 143, no. 4, pp. 250-256, 1996.

R. Sion, M. Atallah, and S. Prabhakar, “Rights Protection for Relational Data,†Proc. ACM SIGMOD, pp. 98-109, 2003.

Y. Li, V. Swarup, and S. Jajodia, “Fingerprinting Relational Databases: Schemes and Specialties,†IEEE Trans. Dependable and Secure Computing, vol. 2, no. 1, pp. 34-45, Jan.-Mar. 2005.

X. Shu and D. Yao. “Data Leak Detection as a Service†It was published in the “8th International Conference on Secure Privacy Communication Networkâ€2012.

F. Liu, X. Shu, D. Yao and A. R. Butt “Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with Map Reduce algorithmâ€. It was published in the “CODASPY ’15 Proceeding of the 5th ACM Conference on Data and Application Security and Privacyâ€. 2015.

R. Chen, B. C. M. Mohammed, B. C. Desai and K. Wang. “Privacy-Preserving Trajectory Data Publishing by Local Suppression†It was introduced by “Journal of Information Scienceâ€. 2013.

K. Borders and A. Prakash. “Quantifying Information Leaks in Outbound Web Traffic†It was published in IEEE Symposium on Security and Privacyâ€. 2009.

K. Borders, E. V. Weele, B. Lau, and A. Prakash. “Protecting Confidential Data on Personal Computers with Storage Capsules†18th USENIX Security Symposium. 2009.

Karjoth and M. Schunter. “A privacy policy model for enterprises†Computer Security Foundations Workshop. 2002.

Y. Jang, S. P. Chung, B. D. Payne, and W. Lee. “Gyrus: A framework for user-intent monitoring of text-based networked applications.†23rd USENIX Security Symposium.2014.

Bing Wang, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, “Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloudâ€, IEEE 2014.

B. Hauer, "Data and Information Leakage Prevention Within the Scope of Information Security," in IEEE Access, vol. 3, no. , pp. 2554-2565, 2015

Sandip A. Kale C, Prof.S.V. Kulkarni C, “Data Leakage Detection: A Surveyâ€, IOSR Journal of Computer Engineering (IOSRJCE) ISSN : 2278-0661 Volume 1, Issue 6 (July-Aug 2012), PP 32-35

Nikhil Chaware, Prachi Bapat, Rituja Kad, Archana Jadhav, S.M.Sangve, “Data Leakage Detectionâ€, International Journal of Scientific Engineering and Technology (ISSN : 2277-1581) Volume No.1, Issue No.6, pg : 272-273

Nikhil chaware, prachi bapat, rituja kad, archana jadhav, Prof.s.m.sangve, “Data leakage detectionâ€,Journal of information, knowledge and research in Computer engineering, Issn: 0975 – 6760, page 534-535

Ghagare Mahesh, Yadav Sujit, Kamble Snehal, Nangare Jairaj, Shewale Ramchandra, “Data Leakage Detectionâ€, International Research Journal of Engineering and Technology (IRJET), ISSN: 2395 -0056, Page 1056-1060.

Kumar, A. Goyal, A. Kumar, N. K. Chaudhary and S. Sowmya Kamath, "Comparative evaluation of algorithms for effective data leakage detection," 2013 IEEE Conference on Information & Communication Technologies, JeJu Island, 2013, pp. 177-182.

Rakesh Agrawal, Jerry Kiernan, “Watermarking Relational Databasesâ€, IBM Almaden Research Center.

S. Czerwinski, R. Fromm, and T. Hodes, â€Digital music distribution and audio watermarkingâ€.

J.J.K.O. Ruanaidh, W.J. Dowling, and F.M. Boland, “Watermarking Digital Images for Copyright Protection,†IEE Proc. Vision, Signal and Image Processing, vol. 143, no. 4, pp. 250-256, 1996.

R. Sion, M. Atallah, and S. Prabhakar, “Rights Protection for Relational Data,†Proc. ACM SIGMOD, pp. 98-109, 2003.