Secret Detection of Sensitive Data Leakage

Abstract

Surveys from many years have shown that many data leakages has been found due different problems like malicious attacks, hacking, different attacks. Approximately 28% of all data leakages are due to human mistakes which are increasing now a day. There exists lot of techniques to find out the leakages. Some cloud also provides this data leak detection (DLD) as an add-on service but they are semihonest means they provide information about leakages but also attempt to get sensitive data of our organization. So proposed work will securely detect leakages and also provide privacy for our sensitive data. This proposed model uses fuzzy fingerprint algorithm to find out the human data leakages securely.

Authors and Affiliations

Miss. Pooja Kolte

Keywords

Related Articles

Feedback Routing Algorithm in optical WDM Networks

This study is mainly concentrate on the routing problem in optical WDM network. In WDM network, the wavelength continuity constrain must be taken care in data communication. Lightpath is the communication channel between...

Mathematical model for Non-linear analysis of the stability of a system during unidirectional solidification with buoyancy and small segregation coefficient

The non-linear analysis of any physical problem is capable of predicting the qualitative and quantitative aspects of the problem. In this article, the effects of the constraints like rotation, permeability and quadratic...

Mobicast Routing Protocol with Multiple Sink Zone Formation in Underwater Sensor Networks

In this paper, we groping the multiple Sink Zone formation Mobicast routing protocol for 3-D Underwater Sensor Networks (USNs). The 3-D USNs consists a number of sensor nodes which are deployed in 3-D environment and Sen...

Security Scheme for Data Authentication Based on Elliptic Curve Cryptography

An encryption is providing authentication and security for illicit manipulation of digital data. In this paper the security scheme for authentication and secrecy of digital data through ElGamal public key cryptographic a...

Color Difference Histogram for Feature Extraction in Video Retrieval 

Content Based Video retrieval is another facet of Content Based Retrieval systems. It is to be noted that videos are far more complex than images as they are a sequence of changing images and audio tracks. Here the conte...

Download PDF file
  • EP ID EP112196
  • DOI -
  • Views 120
  • Downloads 0

How To Cite

Miss. Pooja Kolte (2016). Secret Detection of Sensitive Data Leakage. International Journal of Computer Science & Engineering Technology, 7(2), 38-41. https://europub.co.uk/articles/-A-112196