IDL - International Digital Library Volume 1, Issue 1, FEB-2017
ISSN: IDL Available at: www.dbpuplications.org
Design and Implementation of algorithm for detecting sensitive data leakage in P2P network VARALAKSHMI N, PUSHPALATHA R VTU REGIONAL OFFICE MYSORE, INDIA
Literature Survey ABSTRACT - A dangerous threat the organization meet today is data loss. Data loss may happen intentionally or unintentionally. Intentional data loss happens when authorized person intentionally deletes the file or program. In unintentional data loss happens when the user unknowingly or accidently delete the file. Data loss causes financial damage to the organization. This may be direct loss or indirect loss. The cost of data loss relates to the value of data and also the amount of time it is unavailable. Unavailability of data poses serious problem to the organization. To avoid sensitive data loss a multilevel security system is to be developed to protect those valuable data. It is essential to discover the data leakage as soon as possible. The purpose of the research is to detect the leakage of sensitive data when it moves in a network. Here we proposed efficient novel algorithm is implemented using fingerprint method for detecting sensitive data leakage in a network. Privacy-Preserving Detection of Sensitive Data Exposure Xiaokui Shu, Danfeng Yao IEEE TRANSACTIONS VOL. 10, NO. 5, MAY 2015. This survey statistics from security firms, research institutions and government organizations show that the number of data-leak instances has grown rapidly in recent years. Among various data-leak cases, human mistakes are one of the main causes of data loss. There exist solutions detecting inadvertent sensitive data leaks caused by human mistakes and to provide alerts for organizations. A common approach is to screen content in storage and transmission for exposed IDL - International Digital Library
1|P a g e
Copyright@IDL-2017
IDL - International Digital Library Volume 1, Issue 1, FEB-2017
ISSN: IDL Available at: www.dbpuplications.org
sensitive information. Such an approach usually requires the detection operation to be conducted in secrecy. However, this secrecy requirement is challenging to satisfy in practice, as detection servers may be compromised or outsourced. In this paper, we present a privacy preserving dataleak detection (DLD) solution to solve the issue where a special set of sensitive data digests is used in detection. The advantage of our method is that it enables the data owner to safely delegate the detection operation to a semi honest provider without revealing the sensitive data to the provider. We describe how Internet service providers can offer their customers DLD as an add-on service with strong privacy guarantees. The evaluation results show that our method can support accurate detection with very small number of false alarms under various data-leak scenarios. A Review on Privacy-Preserving Detection of Sensitive Data Exposure Pal Bhavna Shyamlal, International Journal of Trend in Research and Development, Volume 2(5). In recent years, statistics from research institutions, security firms and government organizations show that the numbers of data-leak instances have grown rapidly. Among various data leak cases, main causes of data loss are one of the human mistakes. There exist solutions detecting inadvertent sensitive data leaks caused by human mistakes and to provide alerts for organizations. In this survey paper, we present a privacy preserving data leak detection (DLD) solution where a special set of sensitive data digests is used in detection. The evaluation results show that the detection method can supports accurate detection with very small number of false alarms under various data-leak scenarios. The advantage of this method is that it enables the data owner to safely delegate the detection operation without revealing the sensitive data to the provider. A Review on Fuzzy Fingerprints Based Privacy Preserving Approach Minal Loharkar and Dr. Shyamrao Gumaste, International Journal of Advanced in Research and Technology, Volume 1. The Statistics from security firms, research institutions and government organizations shows many data-leaks. Human mistakes are one of the main causes of data loss in various data-leak IDL - International Digital Library
2|P a g e
Copyright@IDL-2017
IDL - International Digital Library Volume 1, Issue 1, FEB-2017
ISSN: IDL Available at: www.dbpuplications.org
cases. There exist many solutions detecting unintentional, sensitive data leaks caused by human mistakes and to provide alerts against them to the organization. Here privacy preserving dataleak detection (DLD) solution is used to detect the data loss. Two techniques are used Rabin fingerprint and sliding window. The advantage of proposed method is that, it enables the data owner how to protect the data from being leaked. DLD is offered to the customers with some Internet service providers that can offer service with strong privacy guarantees. Thus evaluation results show that this method can support accurate detection of leaks in various data-leak cases with very small number of false alarms. Survey on Privacy-Preserving Detection of Sensitive Data Exposure Madhavi R Suryawanshi and Sarita A Patil, International Journal of Science and Research, Volume 4 Issue 12, December 2015. Measurements from security firms, research foundations what's more, government associations demonstrate that the quantity of information hole occasions have developed quickly as of late. Here human mix-ups are one of the fundamental drivers of information misfortune. Such a methodology as a rule requires the identification operation to be directed in mystery. In this paper, we introduce a privacy preserving information spill location (DLD) answer for fathom the issue where an extraordinaryarrangement of delicate information summaries is utilized as a part of identification. The upside of our system is that it empowers the information proprietor to securely appoint the discovery operation to a semi honest supplier without uncovering the touchy information to the supplier. We portray how Internet administration suppliers can offer their clients DLD as an extra administration with solid protection ensures. Here system can bolster exact recognition with little number of false cautions under different information spill situations. Privacy-Preserving Detection of Sensitive Data Exposure M.Preethi, International Journal of Research Instinct Vol 3 (Issue 2), Aug - 2016. This survey “Privacy-Preserving Detection of Sensitive Data Exposure� is used to detect the data leakage of sensitive data. Most of the organizations transfer data over the internet. So the administrators are faced with the task of keeping confidential information from leaving their networks. Mostly the data loss is caused mainly by human mistakes. Recently Government IDL - International Digital Library
3|P a g e
Copyright@IDL-2017
IDL - International Digital Library Volume 1, Issue 1, FEB-2017
ISSN: IDL Available at: www.dbpuplications.org
organizations show that the numbers of data-leak instances have grown quickly. One of the important issues in the information security research is data leakage or data loss especially caused by insider threat as insider threats have potential to thrust severe damage to the organization’s resources, financial assets and reputation. However, privacy and secrecy consideration can prohibit the organizations from willing to share the data from each other and this is one of the major tasks in the information security. In this article we are using the data digest method for reducing data leakage and misuse detection. The data is breaking into packets while transferring over the internet. So the message will rise if the data leakage occurs. Finally the data can be merged and viewed by the owner. Secret Detection of Sensitive Data Leakage Pooja Kolte, International International Journal of Computer Science & Engineering Technology, Vol. 7 No. 02 Feb 2016. Surveys from many years have shown that many data leakages has been found due different problems like malicious attacks, hacking, different attacks. Approximately 28% of all data leakages are due to human mistakes which are increasing now a day. There exists lot of techniques to find out the leakages. Some cloud also provides this data leak detection (DLD) as an add-on service but they are semi honest means they provide information about leakages but also attempt to get sensitive data of our organization. So proposed work will securely detect leakages and also provide privacy for our sensitive data. This proposed model uses fuzzy fingerprint algorithm to find out the human data leakages securely. An Improved Privacy Preserving Technique to Avoid Sensitive Data Leakage Using tCloseness TechniquePranjali A Meshram and Ranjana Shende, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 1, January 2016. This survey study about in government organizations and in research institutions there is huge amount of data that need privacy. And data privacy is becoming the big issue day by day. In this paper we will study method which will provide privacy to sensitive data. The method called fuzzy fingerprints and DLD (Data leak Detection) are the techniques which provide privacy to IDL - International Digital Library
4|P a g e
Copyright@IDL-2017
IDL - International Digital Library Volume 1, Issue 1, FEB-2017
ISSN: IDL Available at: www.dbpuplications.org
sensitive data and leaks if any. t-closeness technique is used to make Fuzzy Fingerprints. Privacy preserving data-leak detection (DLD) solution is used to solve the issue of special set of sensitive data digests. It enables the owner of data to safely give the detection operation to a semi-honest provider without revealing the sensitive data to the provider.
IDL - International Digital Library
5|P a g e
Copyright@IDL-2017