Downloading: A Survey on the Various Techniques of Data Leakage Detection
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Your Article PDF will be Downloaded in Next Seconds

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Now-a-days trusted parties will be given sensitive data by the data distributor. So, this data must be protected and should not be found in an unauthorized place. This paper mainly focuses on a survey of the leakage of the data by the various agents within the organization and the different techniques to avoid this leakage. In several fields of research, data is highly confidential. Since, the data is shared by a large number of people, it is vulnerable to alteration and leakage. So, this paper mainly focuses on a survey of various data leakage detection techniques and the approach proposed mainly focuses on delegated access control with the tracing of MAC address so that the leaker can be detected and the data can be blocked to the unauthorized world.

Keywords: Data distributor, agents, data leakage, MAC, delegated access control

Edition: Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

Share this Article

How to Cite this Article?

Saranya S. Devan, Minu Lalitha Madhavu, "A Survey on the Various Techniques of Data Leakage Detection", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20141228, Volume 3 Issue 7, July 2014, 1087 - 1088



Top