An Efficient Method to Discover Transformed Data Leak
Keywords:
Sensitive dat, Data leak, Data detection,, levenshtein-distance, luecene searchAbstract
The computer system poses a serious threat to the organisational security due to the leak of sensitive data. According to the report of risk based security (RBS), the leaked sensitive data records has increased dramatically during last few years, (i.e.) from 412 million in 2012 to 822 million in 2013. These are caused only by the lack of proper encryption on files and documents and by human errors these causes data loss. Organisation has the responsibility of screening the content which is stored in the system as sensitive data. In this paper, we utilize two techniques, which are levenshtein-distance technique and luecene search framework. These two helps to detect the leakage of data and this technique is used for screening the data which are outsourced and it also keep an track of, who is transferring the data
References
[1] X. Shu, D. Yao, and E. Bertino, “Privacy preserving detection of sensitive data exposure,” IEEE Trans. Inf. ForensicsSecurity, vol. 10, no. 5, pp. 1092–1103, May 2015.
[2] K. Borders and A. Prakash, “Quantifying information leaks in outbound Web traffic,” in Proc. 30th IEEESymp. Secur. Privacy (SP), May 2009, pp. 129–140.
[3] S. Jha, L. Kruger, and V. Shmatikov, “Towards practical privacy for genomic computation,” in Proc. IEEE Symp.Secur.Privacy, May 2008, pp. 216–230.
[4] S. Kumar, B. Chandrasekaran, J. Turner, and G. Varghese, “Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia,” in Proc. 3rd ACM/IEEE Symp. Archit. Netw.Commun. Syst. (ANCS), 2007, pp. 155–164.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
