Skip to main content

2021 | OriginalPaper | Buchkapitel

An Organized Study on Data Divulge Elimination and Discernment

verfasst von : Khushbu, Poonam Nishad, Vipin Kashyap, Ishu Gupta, Ashutosh Kumar Singh

Erschienen in: Computer Networks and Inventive Communication Technologies

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Exchange of information is done in every organization. Information can be confidential and non-confidential. There are several channels through which exchange of data is done. During this process of exchange, data gets leaked. Enterprises are facing a lot of issues with data leakage and also towards recognizing the leakers. It is a very important need for the organization to exchange confidential information securely and easily. The main goal is to create the data leakage prevention and detection model which detects when the allocator’s sensitive information has been disclosed by operators and also to identify the leaker that leaked the data. Leakage of confidential information leads to a great loss to the organization. In addition to financial loss, an organization’s reputation is ruined and facing its identity stolen. These losses take a lot of time to recover. In this paper, it will focus on research papers on various techniques, which consists of classification strategies to identify sensitive and non-sensitive data, distribution strategy to monitor data, and encryption technique used.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Fan Y, Rongwei Y, Lina W, Xiaoyan M (2013) A distribution model for data leakage prevention. In: 2013 International conference on mechatronic sciences, electric engineering and computer (MEC), Shenyang, China, Dec 20–22 Fan Y, Rongwei Y, Lina W, Xiaoyan M (2013) A distribution model for data leakage prevention. In: 2013 International conference on mechatronic sciences, electric engineering and computer (MEC), Shenyang, China, Dec 20–22
2.
Zurück zum Zitat Huang X, Lu Y, Li D, Ma M (2018) In: A novel mechanism for fast detection of transformed data leakage June 28 Huang X, Lu Y, Li D, Ma M (2018) In: A novel mechanism for fast detection of transformed data leakage June 28
3.
Zurück zum Zitat Zhang Z, Guan Y, Ma X, Zhang L (2019) Act share: sensitive data sharing with reliable leaker identification. arXiv:1907.11833v1[cs.CR] July 27 Zhang Z, Guan Y, Ma X, Zhang L (2019) Act share: sensitive data sharing with reliable leaker identification. arXiv:1907.11833v1[cs.CR] July 27
4.
Zurück zum Zitat Waziri VO, Idris I, Alhassan JK, Adedayo BO (2016) Data loss prevention and challenges faced in their deployments. In: International conference on information and communication technology and its applications (ICTA 2016), Federal University of Technology, Minna, Nigeria, November 28–30, 2016 Waziri VO, Idris I, Alhassan JK, Adedayo BO (2016) Data loss prevention and challenges faced in their deployments. In: International conference on information and communication technology and its applications (ICTA 2016), Federal University of Technology, Minna, Nigeria, November 28–30, 2016
5.
Zurück zum Zitat Hauer B (2015) Data and information leakage prevention within the scope of information security. In: 2015 IEEE December 7 Hauer B (2015) Data and information leakage prevention within the scope of information security. In: 2015 IEEE December 7
6.
Zurück zum Zitat Gupta I, Singh AK (2020) An integrated approach for data leaker detection in cloud environment. J Info Sci Eng 36(5):993–1005 Gupta I, Singh AK (2020) An integrated approach for data leaker detection in cloud environment. J Info Sci Eng 36(5):993–1005
7.
Zurück zum Zitat Wakhare Yashwant R, Patil BM (2016) Data leakage detection with k-anonymityalgorithm. Int J Comput Sci Info Technol 7(4):1911–1915 Wakhare Yashwant R, Patil BM (2016) Data leakage detection with k-anonymityalgorithm. Int J Comput Sci Info Technol 7(4):1911–1915
8.
Zurück zum Zitat Gupta I, Singh N, Singh AK (2019) Layer-based privacy and security architecture for cloud data sharing. J Commun Softw Syst (JCOMSS) 15(2):173–185 Gupta I, Singh N, Singh AK (2019) Layer-based privacy and security architecture for cloud data sharing. J Commun Softw Syst (JCOMSS) 15(2):173–185
9.
Zurück zum Zitat Gupta I, Singh AK (2020) A framework for malicious agent detection in cloud computing environment. Int J Adv Sci Technol (IJAST) 135:49–62CrossRef Gupta I, Singh AK (2020) A framework for malicious agent detection in cloud computing environment. Int J Adv Sci Technol (IJAST) 135:49–62CrossRef
10.
Zurück zum Zitat Gupta I, Singh AK (2018) A probabilistic approach for guilty agent detection using bigraph after distribution of sample data. Proc Comput Sci 125:662–668CrossRef Gupta I, Singh AK (2018) A probabilistic approach for guilty agent detection using bigraph after distribution of sample data. Proc Comput Sci 125:662–668CrossRef
11.
Zurück zum Zitat Papadimitriou P, Garcia-Molina H (2009) A model for data leakage detection. In: IEEE International conference on data engineering Papadimitriou P, Garcia-Molina H (2009) A model for data leakage detection. In: IEEE International conference on data engineering
12.
Zurück zum Zitat Rajasekaran M, Gupta A, Sharma P (2018) Data leakage prevention and detection system. Int J Eng Technol 7(3.12):366–368 Rajasekaran M, Gupta A, Sharma P (2018) Data leakage prevention and detection system. Int J Eng Technol 7(3.12):366–368
13.
Zurück zum Zitat Bangar Anjali N, Rokade Geetanjali P, Shivlila P, Shetkar Swati R, Kadu NB (2013) Data leakage detection. Int J Comput Sci Mobile Comput (IJCSMC) 2(5):283–288 Bangar Anjali N, Rokade Geetanjali P, Shivlila P, Shetkar Swati R, Kadu NB (2013) Data leakage detection. Int J Comput Sci Mobile Comput (IJCSMC) 2(5):283–288
14.
Zurück zum Zitat Pawar P, Palwe S, Munde S, Gadhave P, Pachouly S (2016) Privacy preservation and detection of sensitive data exposure over cloud. Int J Adv Res Comput Commun Eng 5(3) Pawar P, Palwe S, Munde S, Gadhave P, Pachouly S (2016) Privacy preservation and detection of sensitive data exposure over cloud. Int J Adv Res Comput Commun Eng 5(3)
15.
Zurück zum Zitat Gupta I, Singh AK (2017) A probability based model for data leakage detection using bigraph. In: 7th international conference on communication and network security (ICCNS-2017), Tokyo, Japan, ACM, pp 1–5 Gupta I, Singh AK (2017) A probability based model for data leakage detection using bigraph. In: 7th international conference on communication and network security (ICCNS-2017), Tokyo, Japan, ACM, pp 1–5
16.
Zurück zum Zitat Gupta I, Singh AK (2019) A confidentiality preserving data leaker detection model for secure sharing of cloud data using integrated techniques. In: Seventh international conference on smart computing and communication systems (ICSCC), Sarawak, Malaysia, pp 1–5 Gupta I, Singh AK (2019) A confidentiality preserving data leaker detection model for secure sharing of cloud data using integrated techniques. In: Seventh international conference on smart computing and communication systems (ICSCC), Sarawak, Malaysia, pp 1–5
17.
Zurück zum Zitat Kaur K, Gupta I, Singh AK (2018) Data leakage prevention: email protection via gateway. J Phys Conf Ser 933(1), IOP Publishing Kaur K, Gupta I, Singh AK (2018) Data leakage prevention: email protection via gateway. J Phys Conf Ser 933(1), IOP Publishing
18.
Zurück zum Zitat Arora U, Verma S, Gupta I, Singh AK (2017) Implementing privacy using modified tree and map technique. In: 3rd international conference on advances in computing, communication and automation (ICACCA), IEEE, pp 1–5 Arora U, Verma S, Gupta I, Singh AK (2017) Implementing privacy using modified tree and map technique. In: 3rd international conference on advances in computing, communication and automation (ICACCA), IEEE, pp 1–5
19.
Zurück zum Zitat Kaur KN, Divya, Gupta I, Singh AK (2019) Digital image watermarking using (2, 2) visual cryptography with DWT-SVD based watermarking. In: Computational intelligence in data mining: advances in intelligent systems and computing, Springer, Singapore, vol 711, pp 77-86 Kaur KN, Divya, Gupta I, Singh AK (2019) Digital image watermarking using (2, 2) visual cryptography with DWT-SVD based watermarking. In: Computational intelligence in data mining: advances in intelligent systems and computing, Springer, Singapore, vol 711, pp 77-86
20.
Zurück zum Zitat Kaur K, Gupta I, Singh AK (2017) A comparative evaluation of data leakage/loss prevention systems (DLPS). In: Proceedinga 4th international conference computer science and information technology (CS & IT-CSCP), Dubai, UAE, pp 87–95 Kaur K, Gupta I, Singh AK (2017) A comparative evaluation of data leakage/loss prevention systems (DLPS). In: Proceedinga 4th international conference computer science and information technology (CS & IT-CSCP), Dubai, UAE, pp 87–95
21.
Zurück zum Zitat Gupta I, Singh AK (2019) Dynamic threshold based information leaker identification scheme. Inf Process Lett 147:69–73MathSciNetCrossRef Gupta I, Singh AK (2019) Dynamic threshold based information leaker identification scheme. Inf Process Lett 147:69–73MathSciNetCrossRef
22.
Zurück zum Zitat Baby A, Krishnan H (2017) A literature survey on data leak detection and prevention methods. Int J Adv Res Comput Sci 8(5) Baby A, Krishnan H (2017) A literature survey on data leak detection and prevention methods. Int J Adv Res Comput Sci 8(5)
23.
Zurück zum Zitat Kaur K, Gupta I, Singh AK (2017) A comparative study of the approach provided for preventing the data leakage. Int J Netw Secur Appl (IJNSA) 9(5):21–33 Kaur K, Gupta I, Singh AK (2017) A comparative study of the approach provided for preventing the data leakage. Int J Netw Secur Appl (IJNSA) 9(5):21–33
24.
Zurück zum Zitat Lawton G (2008) New technology prevents data leakage. Computer 41(9):14–17CrossRef Lawton G (2008) New technology prevents data leakage. Computer 41(9):14–17CrossRef
25.
Zurück zum Zitat Nag A, Kesharwani A, Sharma B, Gupta I, Tiwari A, Singh AK (2019) Potential and extension of internet of things. Lecture notes on data engineering and communications technologies, Springer, pp 542–551 Nag A, Kesharwani A, Sharma B, Gupta I, Tiwari A, Singh AK (2019) Potential and extension of internet of things. Lecture notes on data engineering and communications technologies, Springer, pp 542–551
26.
Zurück zum Zitat Batra G, Singh H, Gupta I, Singh AK (2017) Best fit sharing and power aware (BFSPA) algorithm for VM placement in cloud environment. In: 3rd International conference on advances in computing, communication and automation (ICACCA), IEEE, pp 1–5 Batra G, Singh H, Gupta I, Singh AK (2017) Best fit sharing and power aware (BFSPA) algorithm for VM placement in cloud environment. In: 3rd International conference on advances in computing, communication and automation (ICACCA), IEEE, pp 1–5
Metadaten
Titel
An Organized Study on Data Divulge Elimination and Discernment
verfasst von
Khushbu
Poonam Nishad
Vipin Kashyap
Ishu Gupta
Ashutosh Kumar Singh
Copyright-Jahr
2021
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-15-9647-6_45

Neuer Inhalt