Design and Implementation of algorithm for detecting sensitive data leakage in P2P network

Page 1

IDL - International Digital Library Volume 1, Issue 1, FEB-2017

ISSN: IDL Available at: www.dbpuplications.org

Design and Implementation of algorithm for detecting sensitive data leakage in P2P network VARALAKSHMI N, PUSHPALATHA R VTU REGIONAL OFFICE MYSORE, INDIA

Literature Survey ABSTRACT - A dangerous threat the organization meet today is data loss. Data loss may happen intentionally or unintentionally. Intentional data loss happens when authorized person intentionally deletes the file or program. In unintentional data loss happens when the user unknowingly or accidently delete the file. Data loss causes financial damage to the organization. This may be direct loss or indirect loss. The cost of data loss relates to the value of data and also the amount of time it is unavailable. Unavailability of data poses serious problem to the organization. To avoid sensitive data loss a multilevel security system is to be developed to protect those valuable data. It is essential to discover the data leakage as soon as possible. The purpose of the research is to detect the leakage of sensitive data when it moves in a network. Here we proposed efficient novel algorithm is implemented using fingerprint method for detecting sensitive data leakage in a network. Privacy-Preserving Detection of Sensitive Data Exposure Xiaokui Shu, Danfeng Yao IEEE TRANSACTIONS VOL. 10, NO. 5, MAY 2015. This survey statistics from security firms, research institutions and government organizations show that the number of data-leak instances has grown rapidly in recent years. Among various data-leak cases, human mistakes are one of the main causes of data loss. There exist solutions detecting inadvertent sensitive data leaks caused by human mistakes and to provide alerts for organizations. A common approach is to screen content in storage and transmission for exposed IDL - International Digital Library

1|P a g e

Copyright@IDL-2017


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Design and Implementation of algorithm for detecting sensitive data leakage in P2P network by dbpublications - Issuu