Secret Detection of Sensitive Data Leakage

Abstract

Surveys from many years have shown that many data leakages has been found due different problems like malicious attacks, hacking, different attacks. Approximately 28% of all data leakages are due to human mistakes which are increasing now a day. There exists lot of techniques to find out the leakages. Some cloud also provides this data leak detection (DLD) as an add-on service but they are semihonest means they provide information about leakages but also attempt to get sensitive data of our organization. So proposed work will securely detect leakages and also provide privacy for our sensitive data. This proposed model uses fuzzy fingerprint algorithm to find out the human data leakages securely.

Authors and Affiliations

Miss. Pooja Kolte

Keywords

Related Articles

Design and Implementation of an Active RFID Tag

The Active Radio Frequency Identification tag that is RFID tag with battery is promising for RFID low power consumption and precise localization in indoor cluttered as well as for outdoor environment. In this paper, Desi...

Peer to Peer Cooperation for Caching in Wireless Networks

Some recent studies have shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. All these studies are at a very high level, leaving many design...

Survey on a Novel approach for Reversible Data Hiding: Principles, Techniques and Recent studies

Today data hacking is a very big problem in networking field. There are many security techniques are available for solving the problem. One of these data-hiding, using this concept we can provide security, authentication...

Pistons & Rings Management System

The rapid growth of human-computer interaction efforts resulted, more and more useful softwares to reduce human efforts. The item inventory system automated inventory system , instead of manually, manage inventory of a S...

CRYPTOGRAPHIC METHOD FOR DIGITAL DOCUMENT

Due to the recent development of computers and computer networks, huge amount of digital data can easily be transmitted or stored. However, transmitted data in networks or stored data in computers may easily substitute b...

Download PDF file
  • EP ID EP112196
  • DOI -
  • Views 132
  • Downloads 0

How To Cite

Miss. Pooja Kolte (2016). Secret Detection of Sensitive Data Leakage. International Journal of Computer Science & Engineering Technology, 7(2), 38-41. https://www.europub.co.uk/articles/-A-112196