Figure - uploaded by Vijayalakshmi v.
Content may be subject to copyright.
FIG.NO:1 Architecture diagram II. ROLE OF DATA LEAKAGE DETECTION The Data leak detection technique allows finding out the leakage of confidential data. The Data owners contains the confidential data, it has to deliver to the authorised end user. But that data may be accidentally leaked or found in unauthorised user. Data leak detection technique identifies the leaked data. It ensures the efficiency of sensitive data. Network data-leak detection (DLD) typically performs deep packet inspection (DPI) and searches for any occurrences of sensitive data patterns. DPI is a technique to analyse payloads of IP/TCP packets for inspecting application layer data, e.g., HTTP header/content. Alerts are triggered when the amount of sensitive data found in traffic passes a threshold.

FIG.NO:1 Architecture diagram II. ROLE OF DATA LEAKAGE DETECTION The Data leak detection technique allows finding out the leakage of confidential data. The Data owners contains the confidential data, it has to deliver to the authorised end user. But that data may be accidentally leaked or found in unauthorised user. Data leak detection technique identifies the leaked data. It ensures the efficiency of sensitive data. Network data-leak detection (DLD) typically performs deep packet inspection (DPI) and searches for any occurrences of sensitive data patterns. DPI is a technique to analyse payloads of IP/TCP packets for inspecting application layer data, e.g., HTTP header/content. Alerts are triggered when the amount of sensitive data found in traffic passes a threshold.

Source publication
Conference Paper
Full-text available
Network security is a method used to prevent the unauthorized access or modification on computer network. Information security is the process of guarding the confidential data from the unlicensed users. Data leakage happens when a system is designed to be closed to a listener reveals some information to unauthorized parties on the other hand. In th...

Similar publications

Article
Full-text available
Cloud computing has become a new network service mode, which can provide a series of resources for many users and carry out intelligent computing according to their needs and daily habits. While technology development brings positive effect, it will also have negative effects. More and more hackers and viruses are trying to invade computers, endang...
Article
Full-text available
Today’s advancements in wireless communication technologies have resulted in a tremendous volume of data being generated. Most of our information is part of a widespread network that connects various devices across the globe. The capabilities of electronic devices are also increasing day by day, which leads to more generation and sharing of informa...
Article
Full-text available
Work from Home is the new trend in corporate working culture in this Covid-19 pandemic situation. Of course it is a preventative measure to avoid the infection from the disease. Not only companies or corporate world but also education sectors are hugely depending on "online study" as schools and colleges are closed during the pandemic period. Cloud...
Article
Full-text available
Attacks on network systems are becoming more and more common, the current state of increasingly sophisticated attack methods, the emergence of intrusion prevention technology is the inevitable result of the development of computer technology and network technology, and research on intrusion prevention has become a new focus of network security tech...
Article
Full-text available
In order to further improve the accuracy and efficiency of network information security situation prediction, this study used the dynamic equal-dimensional method based on gray correlation analysis to improve the GM (1, N) model and carried out an experiment on the designed network security situation prediction (NSSP) model in a simulated network e...

Citations

... This techniques deal with the data allocation problem means in what way a distributor should provide data to the agents so that the chances to identify a guilty agent can be improved. One way to fulfill the same purpose is that admin sends files to authorized users [14]. Agents receives secret key via mail and hence chances to detect guilty agents rise up. ...
Conference Paper
Full-text available
Network security is a wide concept in use to make data secure from alteration on network or an illegal access. Information security is a method to protect sensitive data from the unauthorized agents. Generally data leakage occurs as any of data recipient/ agent/ third party discloses the sensitive information to the unauthorized user. Data is an essential asset for an organization. Data must be secured from loss and leakage. In today era huge amount of the data is needed to share among various parties. But this sharing of data causes various issues like data leakage or alteration. To avoid these issues, a survey has been performed. This paper put a light on the techniques to identify data leakage, compares various data leakage detection techniques and shows a survey about the recent research techniques used to identify data leakage.
... Cloud storage becomes increasingly popular because it is relatively cheaper and easier to manage data. However, uncontrolled sensitive data leakage has become a major threat [1] . Once users upload their files on cloud, they lose control of their data and transfer control to semi-trusted cloud storage providers, bringing up all kinds of issues of data security: data position, data separation, data revival, data integrity protection and data audit [2] . ...
Article
Full-text available
With the use of cloud storage services, one of the concerns is how to protect sensitive data securely and privately. While users enjoy the convenience of data storage provided by semi-trusted cloud storage providers, they are confronted with all kinds of risks at the same time. In this paper, we present SSeCloud, a secure cloud storage system that improves security and usability by applying secret sharing scheme to secure keys. The system encrypts uploading files on the client side and splits encrypted keys into three shares. Each of them is respectively stored by users, cloud storage providers and the alternative third trusted party. Any two of the parties can reconstruct keys. Evaluation results of prototype system show that SSeCloud provides high security without too much performance penalty.
Chapter
The identification of sensitive information, whether personal or institutional, is a fundamental step when dealing with the problem of information leakage. This problem is one of the most pressing to which companies and research centers dedicate a considerable amount of material and intellectual resources, as a particular case, to the development of methods or the application of some already known ones to the identification of sensitive information. This increased the proposals with promising results, but without yet offering a totally satisfactory solution to the problem. Under these conditions, it is considered necessary to make a critical analysis of the existing methods and techniques and their future projections. In this paper, a review of the proposals for the determination of sensitivity in textual documents is presented and a taxonomy is introduced to better understand the approaches with which this problem has been approached in the context of information leakage. Starting from the critical analysis and the practical needs raised by experts in the areas of possible application, lines of research on this subject are outlined that include the development of methods for the automation of the classification of sensitive textual documents. Possible extensions that these studies may have in similar application areas are proposed based on other information carriers, such as the cases of images, recordings and other forms of information object, each of which entails levels of complexity that merit studies analogous to the one carried out in this work.