International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Now-a-days trusted parties will be given sensitive data by the data distributor. So, this data must be protected and should not be found in an unauthorized place. This paper mainly focuses on a survey of the leakage of the data by the various agents within the organization and the different techniques to avoid this leakage. In several fields of research, data is highly confidential. Since, the data is shared by a large number of people, it is vulnerable to alteration and leakage. So, this paper mainly focuses on a survey of various data leakage detection techniques and the approach proposed mainly focuses on delegated access control with the tracing of MAC address so that the leaker can be detected and the data can be blocked to the unauthorized world.

Keywords: Data distributor, agents, data leakage, MAC, delegated access control

Edition: Volume 3 Issue 7, July 2014

Pages: 1087 - 1088


How to Cite this Article?

Saranya S. Devan, Minu Lalitha Madhavu, "A Survey on the Various Techniques of Data Leakage Detection", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20141228, Volume 3 Issue 7, July 2014, 1087 - 1088

21 PDF Views | 20 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data distributor'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 992 - 994

Data Leakage Detection Model for Finding Guilty Agents

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar

Share this article



Similar Articles with Keyword 'agents'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1709 - 1713

Rider: A Multi Layer Framework for Road Condition Estimation

Sona P, Divya M

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 992 - 994

Data Leakage Detection Model for Finding Guilty Agents

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3070 - 3074

Misbehavior Detection Embedded with Agent Based Routing in Delay Tolerant Networks

K. Deepika, Sujatha S G

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2253 - 2256

A Detailed Anatomization of Mobile Agents

Payal Beniwal, Dr. Mukesh Kumar

Share this article



Similar Articles with Keyword 'data leakage'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 992 - 994

Data Leakage Detection Model for Finding Guilty Agents

J.P.Chavan, Ashwini Choutmol, Rahul Shelke, Satish Shelar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2715 - 2717

Privacy Preserving ANN Over Cloud

Babaso Shinde, Ajay Gupta

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this article



Similar Articles with Keyword 'MAC'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 6, June 2020

Pages: 901 - 905

Low Latency Placement for Effective Fog based Infrastructure

Dr. Varsha Jotwani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 685 - 689

Secure Routing in Wireless Sensor Networks through the Identified Trusted Node

D. Latha, K. Palanivel

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1690 - 1694

Analytics of Application Resource Utilization within the Virtual Machine

Priyanka H

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 774 - 777

MapReduce: Architecture and Internals

V. Sajwan, V. Yadav

Share this article

Research Paper, Computer Science & Engineering, Lebanon, Volume 6 Issue 6, June 2017

Pages: 1491 - 1494

Architecture and Management of Medical Laboratory within a Hospital Center (CheBHosp)

Mohamad Ali Cheaito

Share this article
Top