A Survey on the Various Techniques of Data Leakage Detection
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 7)Publication Date: 2014-07-05
Authors : Saranya S. Devan; Minu Lalitha Madhavu;
Page : 1087-1088
Keywords : Data distributor; agents; data leakage; MAC; delegated access control;
Abstract
Now-a-days trusted parties will be given sensitive data by the data distributor. So, this data must be protected and should not be found in an unauthorized place. This paper mainly focuses on a survey of the leakage of the data by the various agents within the organization and the different techniques to avoid this leakage. In several fields of research, data is highly confidential. Since, the data is shared by a large number of people, it is vulnerable to alteration and leakage. So, this paper mainly focuses on a survey of various data leakage detection techniques and the approach proposed mainly focuses on delegated access control with the tracing of MAC address so that the leaker can be detected and the data can be blocked to the unauthorized world.
Other Latest Articles
- Phytochemical Analysis of Calotropis Giganteae with Study of its Medicinal Properties
- Application of Artificial Neural Network (ANN) for Reservoir Water Level Forecasting
- Drought Assessment Using Standardized Precipitation Index
- Production of Aerated Vermicompost Teas and Their Effects on Xanthomonas Compestris and Black Spot Infected Rose Plants
- Analysis of Some Ground Water Samples with Special Reference to Fluoride in Dudu Tehsil of Jaipur District, Rajasthan, India
Last modified: 2021-06-30 21:02:23