Survey on Data Leak Detection Algorithms

Authors

  • Thrupthy Mohanan A
  • George j
  • Nisha SM
  • Sainudeen L

Keywords:

Leak Detection, Fuzzy finger print random generation, Rabin karp algorithm, Subsequence preserving, Alignment algorithm

Abstract

The data leak detection plays a major role in organizational industry. The data leak poses serious threat to online social Medias, sensitive datas and so on. We take two papers for this survey. Both of them belong to the area of information forensic and security. In first survey, paper develops a model [PPDLD] the model is based on fuzzy finger print method. The goal of this paper is to generate special type of digest is called fuzzy fingerprint. Rabin finger print algorithm is introduced here just for sampling. A filtering method is used during the digestion process. In second survey, paper deals the fast detection of transformed data leak. This paper suggests a preserving method based on alignment algorithm. The paper aim to detect long and inexact leak patterns from sensitive data and network. Detection is based on comparable sampling algorithm.The data leak detection plays a major role in organizational industry. The data leak poses serious threat to online social Medias, sensitive datas and so on. We take two papers for this survey. Both of them belong to the area of information forensic and security. In first survey, paper develops a model [PPDLD] the model is based on fuzzy finger print method. The goal of this paper is to generate special type of digest is called fuzzy fingerprint. Rabin finger print algorithm is introduced here just for sampling. A filtering method is used during the digestion process. In second survey, paper deals the fast detection of transformed data leak. This paper suggests a preserving method based on alignment algorithm. The paper aim to detect long and inexact leak patterns from sensitive data and network. Detection is based on comparable sampling algorithm.

References

X. Shu and D. Yao, “Data leak detection as a service,” in Proc. 8th Int. Conf. Secur. Privacy Commun. Netw., 2012, pp. 222–240

Robert riggo , Abbas Bradi , Davit Harutyunyan,Tinku Rasheed ,Member,IEEE,and toufik Ahmed “scheduling Wireless Virtual Networks Function” IEEE transactions on network and service management, VOL. 13, NO.2, MARCH 2016

X. Shu, D. Yao, and E. Bertino, “Privacy-preserving detection of sensitive data exposure,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 5, pp. 1092–1103, May 2015.

F. Liu, X. Shu, D. Yao, and A. R. Butt, “Privacy-preserving scanning of big content for sensitive data exposure with Map Reduce,” in Proc. 5th ACM Conf. Data Appl. Secur. Privacy (CODASPY), 2015, pp. 195–206.

M. O. Rabin, “Fingerprinting by random polynomials,” Dept. Math., Hebrew Univ. Jerusalem, Jerusalem, Israel, Tech. Rep. TR-15-81, 1981.

A. Z. Broder, “Some applications of Rabin’s fingerprinting method,” in Sequences II. New York, NY, USA: Springer-Verlag, 1993, pp. 143–152.

H. A. Kholidy, F. Baiardi, and S. Hariri, “DDSGA: A data-driven semi-global alignment approach for detecting masquerade attacks,” IEEE Trans. Dependable Secure Comput., vol. 12, no. 2, pp. 164–178, Mar./Apr. 2015.

D. Ficara, G. Antichi, A. Di Pietro, S. Giordano, G. Procissi, and F. Vitucci, “Sampling techniques to accelerate pattern matching in network intrusion detection systems,” in Proc. IEEE Int. Conf. Commun., May 2010, pp. 1–5.

Chinar Bhandari1, Dr. Srinivas Narasim Kini “A Survey Paper on Data Leak Detection using Semi Honest Provider Framework” International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 Impact Factor (2014): 5.611

J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy keyword search over encrypted data in cloud computing,” in Proc. 29th IEEEConf. Comput. Commun., Mar. 2010, pp. 1–5.

Xiaokui Shu, Jing Zhang, Danfeng (Daphne) Yao, and Wu-Chun Feng, Senior Member, IEEE “Fast Detection of Transformed Data Leaks” IEEE transactions on information forensics and security, VOL. 11, NO. 3, MARCH 2016

Ankit Tale, Mayuresh Gunjal,B.A,Ahire “Data Leak Detection Using Information Hiding Techniques” IJCSE, VOL. 2, NO. 3, MARCH 2014

Downloads

Published

2025-11-11

How to Cite

[1]
A. Thrupthy Mohanan, J. George, S. Nisha, and L. Sainudeen, “Survey on Data Leak Detection Algorithms”, Int. J. Comp. Sci. Eng., vol. 4, no. 11, pp. 116–120, Nov. 2025.