Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015
Survey on Privacy Preservation of Sensitive Data
Uma Ashok Huljanti, Dr. Srinivas Narasim Kini
As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential information from leaving their networks. In various data-leak cases, data loss is caused mainly by human mistakes. Recently government organizations show that the numbers of data-leak instances have grown quickly. One of the important issues in the information security research is data leakage or data loss especially caused by insider threat as insider threats have potential to inflict severe damage to the organizations resources, financial assets and reputation. However privacy and secrecy consideration can prohibit the organizations from willing to share the data from each other and this is one of the major tasks in the information security.In literature various papers address the problem of data leakage caused by human mistakes in the field of information security. This paper reviews the different methods used for mitigating data leakage and misuse detection. As per literature, need to develop an effective model for detecting data leakage in the field of information security.
Keywords: Data leakage, Data misuse, Insiders, Network Security, Privacy
Edition: Volume 4 Issue 12, December 2015
Pages: 1303 - 1306
How to Cite this Article?
Uma Ashok Huljanti, Dr. Srinivas Narasim Kini, "Survey on Privacy Preservation of Sensitive Data", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV152198, Volume 4 Issue 12, December 2015, 1303 - 1306
117 PDF Views | 80 PDF Downloads
Similar Articles with Keyword 'Data leakage'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1752 - 1755SNPDAC: Secure Network Protocol with Data Access Controlling in WSN
Uttarkar Amit Ratikant, Hingoliwala H. A.
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2715 - 2717Privacy Preserving ANN Over Cloud
Babaso Shinde, Ajay Gupta
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1303 - 1306Survey on Privacy Preservation of Sensitive Data
Uma Ashok Huljanti, Dr. Srinivas Narasim Kini
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1087 - 1088A Survey on the Various Techniques of Data Leakage Detection
Saranya S. Devan, Minu Lalitha Madhavu
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 972 - 974A Survey Paper on Data Leak Detection using Semi Honest Provider Framework
Chinar Bhandari, Dr. Srinivas Narasim Kini
Similar Articles with Keyword 'Data misuse'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1303 - 1306Survey on Privacy Preservation of Sensitive Data
Uma Ashok Huljanti, Dr. Srinivas Narasim Kini
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1608 - 1614Optimizing Data Misuse Detection by Identifying Guilty Agent without Causing Disturbance and Inconvenience to Trusted Agent
Sangramsinh Deshmukh
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 67 - 69A Survey on Data leakage Optimization and Prevention by Identifying Guilty Agent without Causing Disturbance and Inconvenience to Trusted Agent
Sangramsinh B. Deshmukh, R. N. Phursule
Similar Articles with Keyword 'Insiders'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1303 - 1306Survey on Privacy Preservation of Sensitive Data
Uma Ashok Huljanti, Dr. Srinivas Narasim Kini
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3216 - 3219A Survey on Security Prospects through Multicloud Computing by Adapting Data Splitting
Smita Y. Aparadh, Tejaswini H. Patil
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 556 - 562Information Leakage Prevention in IPsec VPN
Vishnu K G, Chinchu Jacob
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017
Pages: 815 - 819Secure Vehicular Traffic Re-routing System using SCMS in Connected Cars
Prasad Mhatre, Manjushri Mahajan
Similar Articles with Keyword 'Network Security'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1689 - 1692ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems
Vinod Kumar, Syeda Asra, Yallappa Meti
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1317 - 1328An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Shaik Shanawaz, K. Thyagarajan
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2535 - 2538A Survey on Security Mechanism using Colors and Armstrong Numbers
Nutan Gurav, Pratap Singh
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1303 - 1306Survey on Privacy Preservation of Sensitive Data
Uma Ashok Huljanti, Dr. Srinivas Narasim Kini
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1982 - 1985Review: Firewall Privacy Preservation By Packet Filtering Management
Akshay Dattatray Kachare, Geeta Atkar
Similar Articles with Keyword 'Privacy'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2267 - 2274Two Accounts of Solitude in Online Communal Networks
Alla Venu Gopal, G. Srinivasa Reddy
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 823 - 826Survey Paper on Users Location Hiding In Geosocial Recommendation Applications
Mayura Phadnis, Kanchan Varpe
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1486 - 1489Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System
Digvijay A. Patil, Yogesh B. Gurav
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1165 - 1168Privacy Preserving Closed Frequent Pattern Mining
Anju Vijayan