Data Leakage Prevention and Detection System

  • Authors

    • M Rajasekaran
    • Amisha Gupta
    • Padmini Sharma
    2018-07-20
    https://doi.org/10.14419/ijet.v7i3.12.16108
  • Data leakage, Data prevention, MAC address, Guilty agent, AES algorithm
  • Our system includes a data distributor who sends some important information to some third parties, called agents in our system. Some data gets leaked and found in an unauthorized place (e.g., on the internet or somebody's PC). The distributor must be able to detect that the data got leaked and came from one or more agents. Our system detects the guilty agent, who has leaked the data to untrusted agents. For identification of leaked data in existing system uses watermarking technique. However, it has a deficiency that watermarking data can be modified or changed. So, In proposed system another technique is used for improving  chances of detecting guilty agent is MAC (Media Access Control) address with some more prevention strategies to increase the security of the system.

     

     

  • References

    1. [1] Panagiotis Papadimitriou, Hector Garcia-Molina, A Model for Data Leakage Detection Stanford University.

      [2] Panagiotis Papadimitriou, Hector Garcia-Molina, Data Leakage Detection IEEE Transaction on Knowledge and Data Engineering, Vol-23,No 1, January 2011 pp. 51-63

      [3] Ajay Kumar, Ankit Goyal, Ashwini Kumar, Navneet Kumar Chaudhary, Sowmya Kamath ,Comparative Evaluation of Algorithms for Effective Data Leakage Detection, IEEE Conference on Information and Communication Technologies (ICT 2013), pp. 177-182.

      [4] Anush Koneru, G.Siva Nageswara Rao, J. Venkata Rao, Data Leakage Detection Using Encrypted Fake Objects, International Journal of P2P Network Trends and Technology Vol-3 Issue-2 2013 pp. 104-110

      [5] B. Sruthi Patil, Mrs. M. L. Prasanthi, Modern Approaches for Detecting Data Leakage Problem, , International Journal Of Engineering And Computer Science, Vol-2, Issue-2, Feb 2013 pp. 395-399.

      [6] Jaymala Chavan, Priyanka Desai, Relational Data Leakage Detection using Fake Object and Allocation Strategies, International Journal of Computer Applications, Vol-80, No.16 , October 2013 pp. 15-21.

      [7] Rudragouda G Patil, Development of Data leakage Detection Using Data Allocation Strategies, International Journal of Computer Application in Engineering Sciences Vol-1, Issue-2, June 2011 pp. 197200.

      [8] Sandip A. Kale, Prof. S. V. Kulkarni, Data Leakage Detection, International Journal of Advanced Research in Computer and Communication Engineering Vol-1, Issue-9, November 2012 pp. 668-678

      [9] Jagna Ajay Kumar, K. Rajani Devi, An Efficient And Robust Model For Data Leakage Detection System, Journal of Global Research in computer Science, Vol-3, No-6, June 2012 pp. 91-95

      [10] Chapter 2 Data Leakage http://www.springer.com/978-1-4614-2052-1.

  • Downloads

  • How to Cite

    Rajasekaran, M., Gupta, A., & Sharma, P. (2018). Data Leakage Prevention and Detection System. International Journal of Engineering & Technology, 7(3.12), 366-368. https://doi.org/10.14419/ijet.v7i3.12.16108