ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

TRACKING DOWN DATA LEAKAGE BY USING ENCRYPTED FAKE OBJECTS

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 8)

Publication Date:

Authors : ; ;

Page : 593-596

Keywords : ;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT, huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, leakage or alteration. So, to prevent these problems, a data leakage detection system has been proposed. This paper includes brief idea about data leakage detection and a methodology to detect the data leakage persons.

Last modified: 2014-08-29 03:23:43