Downloads: 114
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015
Survey on Privacy-Preserving Detection of Sensitive Data Exposure
Madhavi R Suryawanshi | Sarita A Patil
Abstract: Measurements from security firms, research foundations what's more, government associations demonstrate that the quantity of information hole occasions have developed quickly as of late. Here human mix-ups are one of the fundamental drivers of information misfortune. Such a methodology as a rule requires the identification operation to be directed in mystery. In this paper, we introduce a privacy preserving information spill location (DLD) answer for fathom the issue where an extraordinary arrangement of delicate information summaries is utilized as a part of identification. The upside of our system is that it empowers the information proprietor to securely appoint the discovery operation to a semi honest supplier without uncovering the touchy information to the supplier. We portray how Internet administration suppliers can offer their clients DLD as an extra administration with solid protection ensures. Here system can bolster exact recognition with little number of false cautions under different information spill situations.
Keywords: Data leak, network security, privacy, collection intersection
Edition: Volume 4 Issue 12, December 2015,
Pages: 632 - 634
Similar Articles with Keyword 'Data leak'
Downloads: 101
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1752 - 1755SNPDAC: Secure Network Protocol with Data Access Controlling in WSN
Uttarkar Amit Ratikant | Hingoliwala H. A.
Downloads: 106
Research Paper, Computer Science & Engineering, India, Volume 7 Issue 8, August 2018
Pages: 1298 - 1301Prevention and Detection of Sensitive Information Exposure by Advanced Context Based Data Mining Techniques
Shubham Pampattiwar