A COMPREHENSIVE STUDY AND COMPARISON OF VARIOUS METHODS ON DATA LEAKAGES

B Raja Koti, Dr. GVS Raj Kumar, Dr. Y. Srinivas

Abstract


Data security is an important asset for any organization. Mainly data leakages will take place when a system is premeditated such that some vital information about the organization is revealed to unauthorized parties. In addition, during the time of data sharing, there may be huge chances for the data exposure, leading to leakage or unauthorized modifications. The protection and prevention of sensitive data from leakages is a vital issue to every organization, as the data is the most valuable source for any organization. Many authors have developed and presented their views of safeguarding the data such that the vital information is not explored or leakage. In this article, a detailed survey many such recent innovations on data leakage techniques aimed at detecting data leakages are highlighted for the researchers to have further directions.

Keywords


Data leakage, Fake Object, Fuzzy Finger Print, Storage Capsules, Information Security, Map Reduce Algorithm, Network Security.

Full Text:

PDF

References


Panagiotis Papadimitriou, “Data Leakage Detection”, IEEE Transactions On Knowledge And Data Engineering, Vol. 23

P. Papadimitriou and H. Garcia-Molina, “Data leakage detection”, Technical report, Stanford University, 2008.

Rakesh Agrawal, Jerry Kiernan, “Watermarking Relational Databases”, IBM Almaden Research Center.

S. Czerwinski, R. Fromm, and T. Hodes, “Digital music distribution and audio watermarking”.

J.J.K.O. Ruanaidh, W.J. Dowling, and F.M. Boland, “Watermarking Digital Images for Copyright Protection,” IEEE Proc. Vision, Signal and Image Processing, vol. 143, no. 4, pp. 250-256, 1996.

R. Sion, M. Atallah, and S. Prabhakar, “Rights Protection for Relational Data,” Proc. ACM SIGMOD, pp. 98-109, 2003.

Y. Li, V. Swarup, and S. Jajodia, “Fingerprinting Relational Databases: Schemes and Specialties,” IEEE Trans. Dependable and Secure Computing, vol. 2, no. 1, pp. 34-45, Jan.-Mar. 2005.

X. Shu and D. Yao. “Data Leak Detection as a Service” It was published in the “8th International Conference on Secure Privacy Communication Network”2012.

F. Liu, X. Shu, D. Yao and A. R. Butt “Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with Map Reduce algorithm”. It was published in the “CODASPY ’15 Proceeding of the 5th ACM Conference on Data and Application Security and Privacy”. 2015.

R. Chen, B. C. M. Mohammed, B. C. Desai and K. Wang. “Privacy-Preserving Trajectory Data Publishing by Local Suppression” It was introduced by “Journal of Information Science”. 2013.

K. Borders and A. Prakash. “Quantifying Information Leaks in Outbound Web Traffic” It was published in IEEE Symposium on Security and Privacy”. 2009.

K. Borders, E. V. Weele, B. Lau, and A. Prakash. “Protecting Confidential Data on Personal Computers with Storage Capsules” 18th USENIX Security Symposium. 2009.

Karjoth and M. Schunter. “A privacy policy model for enterprises” Computer Security Foundations Workshop. 2002.

Y. Jang, S. P. Chung, B. D. Payne, and W. Lee. “Gyrus: A framework for user-intent monitoring of text-based networked applications.” 23rd USENIX Security Symposium.2014.

Bing Wang, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, “Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud”, IEEE 2014.

B. Hauer, "Data and Information Leakage Prevention Within the Scope of Information Security," in IEEE Access, vol. 3, no. , pp. 2554-2565, 2015

Sandip A. Kale C, Prof.S.V. Kulkarni C, “Data Leakage Detection: A Survey”, IOSR Journal of Computer Engineering (IOSRJCE) ISSN : 2278-0661 Volume 1, Issue 6 (July-Aug 2012), PP 32-35

Nikhil Chaware, Prachi Bapat, Rituja Kad, Archana Jadhav, S.M.Sangve, “Data Leakage Detection”, International Journal of Scientific Engineering and Technology (ISSN : 2277-1581) Volume No.1, Issue No.6, pg : 272-273

Nikhil chaware, prachi bapat, rituja kad, archana jadhav, Prof.s.m.sangve, “Data leakage detection”,Journal of information, knowledge and research in Computer engineering, Issn: 0975 – 6760, page 534-535

Ghagare Mahesh, Yadav Sujit, Kamble Snehal, Nangare Jairaj, Shewale Ramchandra, “Data Leakage Detection”, International Research Journal of Engineering and Technology (IRJET), ISSN: 2395 -0056, Page 1056-1060.

Kumar, A. Goyal, A. Kumar, N. K. Chaudhary and S. Sowmya Kamath, "Comparative evaluation of algorithms for effective data leakage detection," 2013 IEEE Conference on Information & Communication Technologies, JeJu Island, 2013, pp. 177-182.

Rakesh Agrawal, Jerry Kiernan, “Watermarking Relational Databases”, IBM Almaden Research Center.

S. Czerwinski, R. Fromm, and T. Hodes, ”Digital music distribution and audio watermarking”.

J.J.K.O. Ruanaidh, W.J. Dowling, and F.M. Boland, “Watermarking Digital Images for Copyright Protection,” IEE Proc. Vision, Signal and Image Processing, vol. 143, no. 4, pp. 250-256, 1996.

R. Sion, M. Atallah, and S. Prabhakar, “Rights Protection for Relational Data,” Proc. ACM SIGMOD, pp. 98-109, 2003.




DOI: https://doi.org/10.26483/ijarcs.v8i7.4338

Refbacks

  • There are currently no refbacks.




Copyright (c) 2017 International Journal of Advanced Research in Computer Science