Abstract of Prevention and Detection of Sensitive Information
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 106

Research Paper | Computer Science & Engineering | India | Volume 7 Issue 8, August 2018

Prevention and Detection of Sensitive Information Exposure by Advanced Context Based Data Mining Techniques

Shubham Pampattiwar

In today's world, data security has become a major issue of concern to be addressed. Information Exposure or Leakage is one of the prominent way through which data security is compromised. The data exposure may occur accidentally or intentionally. So a model is required to prevent such kind of scenario. Existing methodologies work on specific phrases or are statistical based techniques. -based methods are not accurate as they do not take context into consideration, and statistical methods ignore the analysis of the text. Thus a new context based approach is introduced to prevent data leakage. This approach anchors the advantages of both the statistical approach as well as based approach. This approach is basically divided into two phases-Drilling stage and Identification stage. The first one deals with the clustering of documents and the latter phase determines the confidentiality. As this approach offers the best of both worlds, it appears that this model is the superior one.

Keywords: Information exposure, Context, Security, Data mining, Clustering

Edition: Volume 7 Issue 8, August 2018

Pages: 1298 - 1301

Share this Article

How to Cite this Article?

Shubham Pampattiwar, "Prevention and Detection of Sensitive Information Exposure by Advanced Context Based Data Mining Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART2019868, Volume 7 Issue 8, August 2018, 1298 - 1301

Enter Your Email Address


Similar Articles with Keyword 'Context'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 421 - 424

Comparative Analysis of AI Techniques in the Prediction of Heart Disease

Irtiqa Dhar

Share this Article

Downloads: 65

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021

Pages: 1165 - 1168

A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features

Chengcheng Yan, Yanping Hu

Share this Article

Similar Articles with Keyword 'Security'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'Data mining'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1068 - 1070

Predicting the Course Knowledge Level of Students using Data Mining Techniques

Thapaswini P S

Share this Article

Downloads: 66 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1669 - 1672

Random Forest Based Heart Disease Prediction

Adeen, Preeti Sondhi

Share this Article

Similar Articles with Keyword 'Clustering'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 421 - 424

Comparative Analysis of AI Techniques in the Prediction of Heart Disease

Irtiqa Dhar

Share this Article

Similar Articles with Keyword 'Information'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'exposure'

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2153 - 2156

Effective Watermarking Techniques on Structured Datasets

Mini Joswin, Deeksha Bhardwaj

Share this Article
Top