Skip to main content
Top

2021 | OriginalPaper | Chapter

An Organized Study on Data Divulge Elimination and Discernment

Authors : Khushbu, Poonam Nishad, Vipin Kashyap, Ishu Gupta, Ashutosh Kumar Singh

Published in: Computer Networks and Inventive Communication Technologies

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Exchange of information is done in every organization. Information can be confidential and non-confidential. There are several channels through which exchange of data is done. During this process of exchange, data gets leaked. Enterprises are facing a lot of issues with data leakage and also towards recognizing the leakers. It is a very important need for the organization to exchange confidential information securely and easily. The main goal is to create the data leakage prevention and detection model which detects when the allocator’s sensitive information has been disclosed by operators and also to identify the leaker that leaked the data. Leakage of confidential information leads to a great loss to the organization. In addition to financial loss, an organization’s reputation is ruined and facing its identity stolen. These losses take a lot of time to recover. In this paper, it will focus on research papers on various techniques, which consists of classification strategies to identify sensitive and non-sensitive data, distribution strategy to monitor data, and encryption technique used.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Fan Y, Rongwei Y, Lina W, Xiaoyan M (2013) A distribution model for data leakage prevention. In: 2013 International conference on mechatronic sciences, electric engineering and computer (MEC), Shenyang, China, Dec 20–22 Fan Y, Rongwei Y, Lina W, Xiaoyan M (2013) A distribution model for data leakage prevention. In: 2013 International conference on mechatronic sciences, electric engineering and computer (MEC), Shenyang, China, Dec 20–22
2.
go back to reference Huang X, Lu Y, Li D, Ma M (2018) In: A novel mechanism for fast detection of transformed data leakage June 28 Huang X, Lu Y, Li D, Ma M (2018) In: A novel mechanism for fast detection of transformed data leakage June 28
3.
go back to reference Zhang Z, Guan Y, Ma X, Zhang L (2019) Act share: sensitive data sharing with reliable leaker identification. arXiv:1907.11833v1[cs.CR] July 27 Zhang Z, Guan Y, Ma X, Zhang L (2019) Act share: sensitive data sharing with reliable leaker identification. arXiv:1907.11833v1[cs.CR] July 27
4.
go back to reference Waziri VO, Idris I, Alhassan JK, Adedayo BO (2016) Data loss prevention and challenges faced in their deployments. In: International conference on information and communication technology and its applications (ICTA 2016), Federal University of Technology, Minna, Nigeria, November 28–30, 2016 Waziri VO, Idris I, Alhassan JK, Adedayo BO (2016) Data loss prevention and challenges faced in their deployments. In: International conference on information and communication technology and its applications (ICTA 2016), Federal University of Technology, Minna, Nigeria, November 28–30, 2016
5.
go back to reference Hauer B (2015) Data and information leakage prevention within the scope of information security. In: 2015 IEEE December 7 Hauer B (2015) Data and information leakage prevention within the scope of information security. In: 2015 IEEE December 7
6.
go back to reference Gupta I, Singh AK (2020) An integrated approach for data leaker detection in cloud environment. J Info Sci Eng 36(5):993–1005 Gupta I, Singh AK (2020) An integrated approach for data leaker detection in cloud environment. J Info Sci Eng 36(5):993–1005
7.
go back to reference Wakhare Yashwant R, Patil BM (2016) Data leakage detection with k-anonymityalgorithm. Int J Comput Sci Info Technol 7(4):1911–1915 Wakhare Yashwant R, Patil BM (2016) Data leakage detection with k-anonymityalgorithm. Int J Comput Sci Info Technol 7(4):1911–1915
8.
go back to reference Gupta I, Singh N, Singh AK (2019) Layer-based privacy and security architecture for cloud data sharing. J Commun Softw Syst (JCOMSS) 15(2):173–185 Gupta I, Singh N, Singh AK (2019) Layer-based privacy and security architecture for cloud data sharing. J Commun Softw Syst (JCOMSS) 15(2):173–185
9.
go back to reference Gupta I, Singh AK (2020) A framework for malicious agent detection in cloud computing environment. Int J Adv Sci Technol (IJAST) 135:49–62CrossRef Gupta I, Singh AK (2020) A framework for malicious agent detection in cloud computing environment. Int J Adv Sci Technol (IJAST) 135:49–62CrossRef
10.
go back to reference Gupta I, Singh AK (2018) A probabilistic approach for guilty agent detection using bigraph after distribution of sample data. Proc Comput Sci 125:662–668CrossRef Gupta I, Singh AK (2018) A probabilistic approach for guilty agent detection using bigraph after distribution of sample data. Proc Comput Sci 125:662–668CrossRef
11.
go back to reference Papadimitriou P, Garcia-Molina H (2009) A model for data leakage detection. In: IEEE International conference on data engineering Papadimitriou P, Garcia-Molina H (2009) A model for data leakage detection. In: IEEE International conference on data engineering
12.
go back to reference Rajasekaran M, Gupta A, Sharma P (2018) Data leakage prevention and detection system. Int J Eng Technol 7(3.12):366–368 Rajasekaran M, Gupta A, Sharma P (2018) Data leakage prevention and detection system. Int J Eng Technol 7(3.12):366–368
13.
go back to reference Bangar Anjali N, Rokade Geetanjali P, Shivlila P, Shetkar Swati R, Kadu NB (2013) Data leakage detection. Int J Comput Sci Mobile Comput (IJCSMC) 2(5):283–288 Bangar Anjali N, Rokade Geetanjali P, Shivlila P, Shetkar Swati R, Kadu NB (2013) Data leakage detection. Int J Comput Sci Mobile Comput (IJCSMC) 2(5):283–288
14.
go back to reference Pawar P, Palwe S, Munde S, Gadhave P, Pachouly S (2016) Privacy preservation and detection of sensitive data exposure over cloud. Int J Adv Res Comput Commun Eng 5(3) Pawar P, Palwe S, Munde S, Gadhave P, Pachouly S (2016) Privacy preservation and detection of sensitive data exposure over cloud. Int J Adv Res Comput Commun Eng 5(3)
15.
go back to reference Gupta I, Singh AK (2017) A probability based model for data leakage detection using bigraph. In: 7th international conference on communication and network security (ICCNS-2017), Tokyo, Japan, ACM, pp 1–5 Gupta I, Singh AK (2017) A probability based model for data leakage detection using bigraph. In: 7th international conference on communication and network security (ICCNS-2017), Tokyo, Japan, ACM, pp 1–5
16.
go back to reference Gupta I, Singh AK (2019) A confidentiality preserving data leaker detection model for secure sharing of cloud data using integrated techniques. In: Seventh international conference on smart computing and communication systems (ICSCC), Sarawak, Malaysia, pp 1–5 Gupta I, Singh AK (2019) A confidentiality preserving data leaker detection model for secure sharing of cloud data using integrated techniques. In: Seventh international conference on smart computing and communication systems (ICSCC), Sarawak, Malaysia, pp 1–5
17.
go back to reference Kaur K, Gupta I, Singh AK (2018) Data leakage prevention: email protection via gateway. J Phys Conf Ser 933(1), IOP Publishing Kaur K, Gupta I, Singh AK (2018) Data leakage prevention: email protection via gateway. J Phys Conf Ser 933(1), IOP Publishing
18.
go back to reference Arora U, Verma S, Gupta I, Singh AK (2017) Implementing privacy using modified tree and map technique. In: 3rd international conference on advances in computing, communication and automation (ICACCA), IEEE, pp 1–5 Arora U, Verma S, Gupta I, Singh AK (2017) Implementing privacy using modified tree and map technique. In: 3rd international conference on advances in computing, communication and automation (ICACCA), IEEE, pp 1–5
19.
go back to reference Kaur KN, Divya, Gupta I, Singh AK (2019) Digital image watermarking using (2, 2) visual cryptography with DWT-SVD based watermarking. In: Computational intelligence in data mining: advances in intelligent systems and computing, Springer, Singapore, vol 711, pp 77-86 Kaur KN, Divya, Gupta I, Singh AK (2019) Digital image watermarking using (2, 2) visual cryptography with DWT-SVD based watermarking. In: Computational intelligence in data mining: advances in intelligent systems and computing, Springer, Singapore, vol 711, pp 77-86
20.
go back to reference Kaur K, Gupta I, Singh AK (2017) A comparative evaluation of data leakage/loss prevention systems (DLPS). In: Proceedinga 4th international conference computer science and information technology (CS & IT-CSCP), Dubai, UAE, pp 87–95 Kaur K, Gupta I, Singh AK (2017) A comparative evaluation of data leakage/loss prevention systems (DLPS). In: Proceedinga 4th international conference computer science and information technology (CS & IT-CSCP), Dubai, UAE, pp 87–95
21.
go back to reference Gupta I, Singh AK (2019) Dynamic threshold based information leaker identification scheme. Inf Process Lett 147:69–73MathSciNetCrossRef Gupta I, Singh AK (2019) Dynamic threshold based information leaker identification scheme. Inf Process Lett 147:69–73MathSciNetCrossRef
22.
go back to reference Baby A, Krishnan H (2017) A literature survey on data leak detection and prevention methods. Int J Adv Res Comput Sci 8(5) Baby A, Krishnan H (2017) A literature survey on data leak detection and prevention methods. Int J Adv Res Comput Sci 8(5)
23.
go back to reference Kaur K, Gupta I, Singh AK (2017) A comparative study of the approach provided for preventing the data leakage. Int J Netw Secur Appl (IJNSA) 9(5):21–33 Kaur K, Gupta I, Singh AK (2017) A comparative study of the approach provided for preventing the data leakage. Int J Netw Secur Appl (IJNSA) 9(5):21–33
24.
go back to reference Lawton G (2008) New technology prevents data leakage. Computer 41(9):14–17CrossRef Lawton G (2008) New technology prevents data leakage. Computer 41(9):14–17CrossRef
25.
go back to reference Nag A, Kesharwani A, Sharma B, Gupta I, Tiwari A, Singh AK (2019) Potential and extension of internet of things. Lecture notes on data engineering and communications technologies, Springer, pp 542–551 Nag A, Kesharwani A, Sharma B, Gupta I, Tiwari A, Singh AK (2019) Potential and extension of internet of things. Lecture notes on data engineering and communications technologies, Springer, pp 542–551
26.
go back to reference Batra G, Singh H, Gupta I, Singh AK (2017) Best fit sharing and power aware (BFSPA) algorithm for VM placement in cloud environment. In: 3rd International conference on advances in computing, communication and automation (ICACCA), IEEE, pp 1–5 Batra G, Singh H, Gupta I, Singh AK (2017) Best fit sharing and power aware (BFSPA) algorithm for VM placement in cloud environment. In: 3rd International conference on advances in computing, communication and automation (ICACCA), IEEE, pp 1–5
Metadata
Title
An Organized Study on Data Divulge Elimination and Discernment
Authors
Khushbu
Poonam Nishad
Vipin Kashyap
Ishu Gupta
Ashutosh Kumar Singh
Copyright Year
2021
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-15-9647-6_45