Downloads: 107 | Views: 294 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015 | Popularity: 7 / 10
Survey on Privacy Preservation of Sensitive Data
Uma Ashok Huljanti, Dr. Srinivas Narasim Kini
Abstract: As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential information from leaving their networks. In various data-leak cases, data loss is caused mainly by human mistakes. Recently government organizations show that the numbers of data-leak instances have grown quickly. One of the important issues in the information security research is data leakage or data loss especially caused by insider threat as insider threats have potential to inflict severe damage to the organizations resources, financial assets and reputation. However privacy and secrecy consideration can prohibit the organizations from willing to share the data from each other and this is one of the major tasks in the information security. In literature various papers address the problem of data leakage caused by human mistakes in the field of information security. This paper reviews the different methods used for mitigating data leakage and misuse detection. As per literature, need to develop an effective model for detecting data leakage in the field of information security.
Keywords: Data leakage, Data misuse, Insiders, Network Security, Privacy
Edition: Volume 4 Issue 12, December 2015
Pages: 1303 - 1306
DOI: https://www.doi.org/10.21275/NOV152198
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 101
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1752 - 1755SNPDAC: Secure Network Protocol with Data Access Controlling in WSN
Uttarkar Amit Ratikant, Hingoliwala H. A.
Downloads: 106
Research Paper, Computer Science & Engineering, India, Volume 7 Issue 8, August 2018
Pages: 1298 - 1301Prevention and Detection of Sensitive Information Exposure by Advanced Context Based Data Mining Techniques
Shubham Pampattiwar
Downloads: 108
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2715 - 2717Privacy Preserving ANN Over Cloud
Babaso Shinde, Ajay Gupta
Downloads: 110
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3216 - 3219A Survey on Security Prospects through Multicloud Computing by Adapting Data Splitting
Smita Y. Aparadh, Tejaswini H. Patil
Downloads: 113
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1087 - 1088A Survey on the Various Techniques of Data Leakage Detection
Saranya S. Devan, Minu Lalitha Madhavu