Downloads: 113 | Views: 268 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015 | Popularity: 6.9 / 10
A Survey Paper on Data Leak Detection using Semi Honest Provider Framework
Chinar Bhandari, Dr. Srinivas Narasim Kini
Abstract: Current Statistics from various security organization research firms and government institutes suggest that there has been a rapid growth of data leak in past 8 years. Thera are various reasons for data leaks amongst which human errors is most endorsing of all. There are many ways in which we can have an audit trail verifying for data leak in networks, but still not all consider human errors as an important check factor, which makes them more prone to fail. Some of the common solutions include keeping a copy of sensitive data at the providers end and maintaining an audit trial for checking whether there is any data leakage in networks, which in turn notifies the organization about data leakage. All these methods in turn are prone to data attacks, as the keep copy of data while auditing. So keeping these errors in mind, we present a novel data leak detection (DLD) framework where we maintain a set of important data or sensitive data digests which is used for the purpose of detection of any data leakage in the network. So this method proves to be non-erroneous due to the fact that the owner does not completely have to expose the sensitive data to the semi honest provider for data leak detection method. The owner has data control rights i. e. he can decide what part of data to be revealed to the semi honest provider and which not to reveal.
Keywords: Data leak Detection Method DLD, semihonest provider SHP, network security, framework
Edition: Volume 4 Issue 11, November 2015
Pages: 972 - 974
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 1999 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 716 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 696 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 696 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 685 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera