ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Survey of Privacy Preserving Techniques and Upcoming Techniques: A Review

Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 2)

Publication Date:

Authors : ; ;

Page : 1798-1802

Keywords : Data leak; network; security; randomization; perturbation; anonymization; cryptography;

Source : Downloadexternal Find it from : Google Scholarexternal


In recent years the data-leak instances are growing rapidly. The confidential and private data in many fields should be protected. Many sectors as government organizations, business fields, defence, medical field and educational statistics have sensitive data which should not be leaked and kept confidential. But it is studied from some reports that in last few years the data leak incidents are doubled and thus there is need to have some more protective technique to secure the confidential data. The existing solutions require some more privacy techniques so as to increase the security of the data. Thus a new technique called a Fuzzy-fingerprinting technique is described. It is a privacy preserving data-leak detection solution to solve the privacy issue. Here a special set of sensitive data digests is used. For the confidential data communication its plaintext data must be encrypted, the data is encrypted using fuzzy-fingerprints and corresponding fuzzy-fingerprinting algorithm. In the data communication the data is usually provided to the server or data-leak detection provider (DLD) provider which is of semi-honest nature and where leak can be found out. The described method keeps the sensitive data exposure to the minimum level and thus it helps to reduce the data-leak instances.

Last modified: 2021-06-30 17:48:27