An Efficient Method to Discover Transformed Data Leak

Authors

  • Sindhuja S M.Sc Computer Science, Idhaya College for Women, Kumbakonam, Tamilnadu, India
  • Valliammai M M.Sc Computer Science, Idhaya College for Women, Kumbakonam, Tamilnadu, India

Keywords:

Sensitive dat, Data leak, Data detection,, levenshtein-distance, luecene search

Abstract

The computer system poses a serious threat to the organisational security due to the leak of sensitive data. According to the report of risk based security (RBS), the leaked sensitive data records has increased dramatically during last few years, (i.e.) from 412 million in 2012 to 822 million in 2013. These are caused only by the lack of proper encryption on files and documents and by human errors these causes data loss. Organisation has the responsibility of screening the content which is stored in the system as sensitive data. In this paper, we utilize two techniques, which are levenshtein-distance technique and luecene search framework. These two helps to detect the leakage of data and this technique is used for screening the data which are outsourced and it also keep an track of, who is transferring the data

References

[1] X. Shu, D. Yao, and E. Bertino, “Privacy preserving detection of sensitive data exposure,” IEEE Trans. Inf. ForensicsSecurity, vol. 10, no. 5, pp. 1092–1103, May 2015.

[2] K. Borders and A. Prakash, “Quantifying information leaks in outbound Web traffic,” in Proc. 30th IEEESymp. Secur. Privacy (SP), May 2009, pp. 129–140.

[3] S. Jha, L. Kruger, and V. Shmatikov, “Towards practical privacy for genomic computation,” in Proc. IEEE Symp.Secur.Privacy, May 2008, pp. 216–230.

[4] S. Kumar, B. Chandrasekaran, J. Turner, and G. Varghese, “Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia,” in Proc. 3rd ACM/IEEE Symp. Archit. Netw.Commun. Syst. (ANCS), 2007, pp. 155–164.

Downloads

Published

2025-11-24

How to Cite

[1]
S. Sindhuja and M. Valliammai, “An Efficient Method to Discover Transformed Data Leak”, Int. J. Comp. Sci. Eng., vol. 7, no. 4, pp. 261–263, Nov. 2025.