Secret Detection of Sensitive Data Leakage

Abstract

Surveys from many years have shown that many data leakages has been found due different problems like malicious attacks, hacking, different attacks. Approximately 28% of all data leakages are due to human mistakes which are increasing now a day. There exists lot of techniques to find out the leakages. Some cloud also provides this data leak detection (DLD) as an add-on service but they are semihonest means they provide information about leakages but also attempt to get sensitive data of our organization. So proposed work will securely detect leakages and also provide privacy for our sensitive data. This proposed model uses fuzzy fingerprint algorithm to find out the human data leakages securely.

Authors and Affiliations

Miss. Pooja Kolte

Keywords

Related Articles

Efficient Speech Recognition System for Isolated Digits

In this paper, an efficient speech recognition system is proposed for speaker-independent isolated digits (0 to 9). Using the Weighted MFCC (WMFCC), low computational overhead is achieved since only 13 weighted MFCC coef...

BER and Channel Capacity Improvement of MIMO-OFDM and Adaptive MIMOOFDM System By Modulation Technique(QAM)

In the present scenario, with the growing demand for wireless communication in today’s life, along with the parallel rapid growth of digital communication technology, new innovative ideas are coming into existence which...

BRAIN TUMOR DETECTION using OTSU for DICOM images, using WATERSHED and ACTIVE CONTOURS for multi-parameter MRI Images.

Brain is the centre of nervous system. Brain can be very complex. It can be said that most important function of the brain is serve as the physical structure underlying the mind. There is a lot of research being done on...

USER REQUIREMENTS WEIGHT BASED APPROACH TO IDS SELECTION FOR WLAN

A variety of featured packed Wireless Intrusion Detection System (WIDS) products are available in the market. They include commercial as well as open source products. It is for user to decide which will be the best WIDS...

Analysis of Fuzzy Fault Tree using Intuitionstic Fuzzy Numbers

In generally fuzzy seats are used to analyses the system reliability. In present paper we have presented a new approach to evaluate the reliability of fuzzy fault tree using Intuitionstic Fuzzy Numbers. In application of...

Download PDF file
  • EP ID EP112196
  • DOI -
  • Views 117
  • Downloads 0

How To Cite

Miss. Pooja Kolte (2016). Secret Detection of Sensitive Data Leakage. International Journal of Computer Science & Engineering Technology, 7(2), 38-41. https://europub.co.uk/articles/-A-112196