Survey on Privacy Preservation of Sensitive Data
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential information from leaving their networks. In various data-leak cases, data loss is caused mainly by human mistakes. Recently government organizations show that the numbers of data-leak instances have grown quickly. One of the important issues in the information security research is data leakage or data loss especially caused by insider threat as insider threats have potential to inflict severe damage to the organizations resources, financial assets and reputation. However privacy and secrecy consideration can prohibit the organizations from willing to share the data from each other and this is one of the major tasks in the information security.In literature various papers address the problem of data leakage caused by human mistakes in the field of information security. This paper reviews the different methods used for mitigating data leakage and misuse detection. As per literature, need to develop an effective model for detecting data leakage in the field of information security.

Keywords: Data leakage, Data misuse, Insiders, Network Security, Privacy

Edition: Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Share this Article

How to Cite this Article?

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini, "Survey on Privacy Preservation of Sensitive Data", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV152198, Volume 4 Issue 12, December 2015, 1303 - 1306

Enter Your Registered Email Address





Similar Articles with Keyword 'Data leakage'

Downloads: 101 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1752 - 1755

SNPDAC: Secure Network Protocol with Data Access Controlling in WSN

Uttarkar Amit Ratikant, Hingoliwala H. A.

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Downloads: 106 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 8, August 2018

Pages: 1298 - 1301

Prevention and Detection of Sensitive Information Exposure by Advanced Context Based Data Mining Techniques

Shubham Pampattiwar

Share this Article

Downloads: 108 | Weekly Hits: ⮙5 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2715 - 2717

Privacy Preserving ANN Over Cloud

Babaso Shinde, Ajay Gupta

Share this Article

Downloads: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 972 - 974

A Survey Paper on Data Leak Detection using Semi Honest Provider Framework

Chinar Bhandari, Dr. Srinivas Narasim Kini

Share this Article

Similar Articles with Keyword 'Data misuse'

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Downloads: 129 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1608 - 1614

Optimizing Data Misuse Detection by Identifying Guilty Agent without Causing Disturbance and Inconvenience to Trusted Agent

Sangramsinh Deshmukh

Share this Article

Downloads: 136 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 67 - 69

A Survey on Data leakage Optimization and Prevention by Identifying Guilty Agent without Causing Disturbance and Inconvenience to Trusted Agent

Sangramsinh B. Deshmukh, R. N. Phursule

Share this Article

Similar Articles with Keyword 'Insiders'

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Downloads: 109 | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3216 - 3219

A Survey on Security Prospects through Multicloud Computing by Adapting Data Splitting

Smita Y. Aparadh, Tejaswini H. Patil

Share this Article

Downloads: 123 | Weekly Hits: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 556 - 562

Information Leakage Prevention in IPsec VPN

Vishnu K G, Chinchu Jacob

Share this Article

Downloads: 144 | Weekly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 815 - 819

Secure Vehicular Traffic Re-routing System using SCMS in Connected Cars

Prasad Mhatre, Manjushri Mahajan

Share this Article

Similar Articles with Keyword 'Network Security'

Downloads: 102 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this Article

Downloads: 103 | Weekly Hits: ⮙3 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, Bahrain, Volume 5 Issue 10, October 2016

Pages: 1112 - 1116

Network Security Mechanism Based On Static Internet Protocol Addressing

Ahmed D. Asad

Share this Article

Downloads: 104 | Weekly Hits: ⮙5 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1879 - 1884

A Defense Security Approach against Hacking Using Trusted Graphs

D. N. Rewadkar, Harshal A. Kute

Share this Article

Similar Articles with Keyword 'Privacy'

Downloads: 32 | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Downloads: 90 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on Users Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

Downloads: 94 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Downloads: 99 | Weekly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Downloads: 99 | Weekly Hits: ⮙3 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1587 - 1591

Layers of Internet Privacy

Amit Dabas, Ashish Kumar Sharma

Share this Article



Top