Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention

Authors

  • Shivakumara T Department of MCA, BMS Institute of Technology and Management, Bengaluru, Karnataka, India
  • Patil RM Department of CSE, Guru Nanak Institute of Technology, Hyderabad, India
  • MS Muneshwara Department of CSE, BMS Institute of Technology and Management, Bengaluru, Karnataka, India

DOI:

https://doi.org/10.26438/ijcse/v7i2.349358

Keywords:

Data, Detection, Dynamic, Leakage, Prevention, Protection, Sensitive, Self-protective, Self-configurable

Abstract

Today’s world needs most of the things would be automated, the machine would be able to do itself everything by its own, from initiation of job to till the decision-making capabilities. Similarly the Security of the data needs the automated, selfdecision and self-protective proactive mechanisms. Since, the existing tools and mechanisms are semi-automated still it needs the human intervention to update and configure the security layers and features. This paper gives the summarized view of the existing work carried out so far in the area of data security – data leakage detection and prevention.

References

[1] Carlie Carlett, et. Al, “A Scientific Research and Development Approach to Cyber Security”, report submitted to Department of Energy, Dec 2008.

[2] Eric Yuan, et. Al, “A Systematic Survey of Self-Protecting Software Systems”, ACM, 1539-9087/2010/03-ART39.

[3] Neeraj Kumar, et. Al, “Detection of Data Leakage in Cloud Computing Environment”, Sixth International Conference on Computational Intelligence and Communication Networks, 978-1-4799-6929-6/2014,IEEE

[4] Marco Pistoia Omer Tripp, et. Al.,” Labyrinth: Visually Configurable Data-leakage Detection in Mobile Applications”, 16th IEEE International Conference on Mobile Data Management, 2015.

[5] Sherry Zhu, An Efficient Data Leakage Prevention Framework for Semiconductor Industry, Proceedings of the 2016 IEEE IEEM, 978-1-5090-3665-3/16/$31.00 ©2016 IEEE

[6] Becker et. Al., Real-Time Data Leakage Prevention and Reporting, 21st September 2017, US Patent publication No. US 2017/0270310 A1

[7] Min-JiSeo, et. Al., An advanced data leakage detection system analyzing relations between data leak activity, International journal of Applied Engineering Research ISSN 0973-4562 Volume 12, No.21,2017, pp 11546-11554

[8] Neha Ramteke, et. Al., Review paper on prevention of data leaks using 3DES Encryption, International journal of innovations & advancement in computer science, IJIACS, ISSN 2347-8616, Vol 6, Issue 11, Nov 2017.

[9] YavuzCanbay, A Turkish language based data leakage prevention system, 2017 5th International Symposium on Digital Forensic and Security (ISDFS), 978-1-5090-5835-8/17/$31.00 ©2017 IEEE

[10] Sarker T. Ahmed Rumee, et. Al., “MirrorDroid :A Framework to Detect Sensitive Information Leakage in Android by Duplicate Program Execution”, 978-1-5090-4780-2/17, IEEE, 2017

[11] Michael D Nelson, Data Leak Protection, 10 May 2018, US Patent Publication, us 2018/0131674 A1

[12] Shivakumara T, et. Al, “To incorporate value-added security features into current data for outsourcing cloud data applications through Secured Access Control and Assured Deletion”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 7, Issue 3, May-June 2018 , ISSN 2278-6856

Downloads

Published

2019-02-28
CITATION
DOI: 10.26438/ijcse/v7i2.349358
Published: 2019-02-28

How to Cite

[1]
T. Shivakumara, R. M. Patil, and M. MS, “Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention”, Int. J. Comp. Sci. Eng., vol. 7, no. 2, pp. 349–358, Feb. 2019.