International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 114 | Views: 269

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015 | Popularity: 7 / 10


     

Survey on Privacy-Preserving Detection of Sensitive Data Exposure

Madhavi R Suryawanshi, Sarita A Patil


Abstract: Measurements from security firms, research foundations what's more, government associations demonstrate that the quantity of information hole occasions have developed quickly as of late. Here human mix-ups are one of the fundamental drivers of information misfortune. Such a methodology as a rule requires the identification operation to be directed in mystery. In this paper, we introduce a privacy preserving information spill location (DLD) answer for fathom the issue where an extraordinary arrangement of delicate information summaries is utilized as a part of identification. The upside of our system is that it empowers the information proprietor to securely appoint the discovery operation to a semi honest supplier without uncovering the touchy information to the supplier. We portray how Internet administration suppliers can offer their clients DLD as an extra administration with solid protection ensures. Here system can bolster exact recognition with little number of false cautions under different information spill situations.


Keywords: Data leak, network security, privacy, collection intersection


Edition: Volume 4 Issue 12, December 2015


Pages: 632 - 634


DOI: https://www.doi.org/10.21275/NOV152026



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Madhavi R Suryawanshi, Sarita A Patil, "Survey on Privacy-Preserving Detection of Sensitive Data Exposure", International Journal of Science and Research (IJSR), Volume 4 Issue 12, December 2015, pp. 632-634, https://www.ijsr.net/getabstract.php?paperid=NOV152026, DOI: https://www.doi.org/10.21275/NOV152026



Similar Articles

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article
Top