TRACKING DOWN DATA LEAKAGE BY USING ENCRYPTED FAKE OBJECTSJournal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 8)
Publication Date: 2014-08-30
Authors : Anugu Rahul Reddy; BalaKrishna Bangaru;
Page : 593-596
Keywords : ;
This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT, huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, leakage or alteration. So, to prevent these problems, a data leakage detection system has been proposed. This paper includes brief idea about data leakage detection and a methodology to detect the data leakage persons.
Other Latest Articles
Last modified: 2014-08-29 03:23:43