Data Leakage Detection Using Client-Server Mechanism

Authors

  • Harshala Khapekar  Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India
  • Sanskruti Gunde  Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India
  • Swati Shingne  Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India
  • Pooja Shende  Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India
  • Drishti Moon  Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India

Keywords:

Data Leakage, Data Allocation Strategies, Fake Objects, Perturbation

Abstract

Data Leakage is defined as an unintentional distribution of sensitive data to an unauthorized agent or entity. Internet act as the main backbone in business organizations and in every other prospect of life. Though internet plays a significant role still there are certain numbers of security issues in transferring the sensitive data as any culprit employee may public this sensitive data. A data distributor has given sensitive data to a set of his trusted employees. Some of the data is leaked and found in an unauthorized place. The distributor needs to evaluate and find out that leak data came from which culprit employee or the unauthenticated agent. This model proposes data allocation strategies to improve the possibility of identifying the leakage. These methods do not depend upon the alterations of the released data. This model introduces realistic but fake data objects to further improve our chances of detecting leakage and identifying the culprit. Finally, this mechanism shall be then implemented on the cloud server.

References

  1. V. Vijaylaxmi, T.Rohini, S.Sujata, A.Vaishali, "Survey on Detecting Leakage of Sensitive Data", IEEE,2016.
  2. Neeraj Kumar, Vijay Katta, Hitanshu Mishra, Hitendra Garg, "Detection of Data Leakage in cloud computing Environment", IEEE,2014.
  3. Panagiotis Papadimitriou, Hector Garcia-Molina, "Data Leakage Detection", IEEE, Vol-23, No.1, January 2011.
  4. Rekha Jadhav, "Data Leakage Detection", International Journal of Computer Science and Communication Network", Vol(3),37-45.
  5. Nikhil Chaware,Prachi Bapat,Rituja Kad,Archana Jadhav,Prof. S.M.Sangve, "Data Leakage Detection", Journal of Information Knowledge and Research in Computer Engineering,Volume-2,Issue-2,Oct 13.
  6. Mr. Zarif Shaukat Ansari, Ms. Anagha Mahadeo Jagtap , Ms. Shilpa Suresh Raut, "Data Leakage Detection and E-mail Filtering", International Journal of Innovative Research in Computer and Communication Engineering, Volume-1,Issue-3,May 2013.
  7. Prof. Shushilkumar N. Holambe, Dr. Ulhas B. Shinde, Archana U. Bhosale, "Data Leakage using cloud Computing", International Journal of Scientific and Engineering and Research, Volume 6, Issue4, April 2015.
  8. V. Shobana, M. Shanmugasundaram, "Data Leakage Detection using Cloud Computing", International Journal of Emerging Technology and Advanced Engineering ICISC, Volume 3,Issue 1,January 2013.
  9. Chandani Bhatt, Prof. Richa Sharma , "Data Leakage Detection" ,International Journal of Computer Science and InformationTechnologies(IJCSIT),Vol.5(2),2014
  10. D. Kumuthavijay, J. Nandhini, V. Jayaprakasan, "Implementation of Efficient Audit Service Outsourcing for Data Integrity by Interfacing the Mobile device in Cloud", International journal of Computer Application ,Volume 67-No.20,April 2013.
  11. Chandu Vaidya and Prashant Khobragade , "Data Security in Cloud Computing", International Journal on Recent and Innovation Trends in Computing and Communication, ISSN:2321-8169,Volume 3,Issue 5,pp-167-170.
  12. Chandu Vaidya, Prashant Khobragade and Ashish Golghate, "Data Leakage Detection and Security in Cloud Computing", GRD Journals-Global Research Development Journal for Engineering,Volume 1,Issue 12,November 2016.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
Harshala Khapekar, Sanskruti Gunde, Swati Shingne, Pooja Shende, Drishti Moon, " Data Leakage Detection Using Client-Server Mechanism, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.191-194, March-April-2017.