Data Leakage Prevention and Detection System
Keywords:Data leakage, Data prevention, MAC address, Guilty agent, AES algorithm
Our system includes a data distributor who sends some important information to some third parties, called agents in our system. Some data gets leaked and found in an unauthorized place (e.g., on the internet or somebody's PC). The distributor must be able to detect that the data got leaked and came from one or more agents. Our system detects the guilty agent, who has leaked the data to untrusted agents. For identification of leaked data in existing system uses watermarking technique. However, it has a deficiency that watermarking data can be modified or changed. So, In proposed system another technique is used for improving chances of detecting guilty agent is MAC (Media Access Control) address with some more prevention strategies to increase the security of the system.
 Panagiotis Papadimitriou, Hector Garcia-Molina, A Model for Data Leakage Detection Stanford University.
 Panagiotis Papadimitriou, Hector Garcia-Molina, Data Leakage Detection IEEE Transaction on Knowledge and Data Engineering, Vol-23,No 1, January 2011 pp. 51-63
 Ajay Kumar, Ankit Goyal, Ashwini Kumar, Navneet Kumar Chaudhary, Sowmya Kamath ,Comparative Evaluation of Algorithms for Effective Data Leakage Detection, IEEE Conference on Information and Communication Technologies (ICT 2013), pp. 177-182.
 Anush Koneru, G.Siva Nageswara Rao, J. Venkata Rao, Data Leakage Detection Using Encrypted Fake Objects, International Journal of P2P Network Trends and Technology Vol-3 Issue-2 2013 pp. 104-110
 B. Sruthi Patil, Mrs. M. L. Prasanthi, Modern Approaches for Detecting Data Leakage Problem, , International Journal Of Engineering And Computer Science, Vol-2, Issue-2, Feb 2013 pp. 395-399.
 Jaymala Chavan, Priyanka Desai, Relational Data Leakage Detection using Fake Object and Allocation Strategies, International Journal of Computer Applications, Vol-80, No.16 , October 2013 pp. 15-21.
 Rudragouda G Patil, Development of Data leakage Detection Using Data Allocation Strategies, International Journal of Computer Application in Engineering Sciences Vol-1, Issue-2, June 2011 pp. 197200.
 Sandip A. Kale, Prof. S. V. Kulkarni, Data Leakage Detection, International Journal of Advanced Research in Computer and Communication Engineering Vol-1, Issue-9, November 2012 pp. 668-678
 Jagna Ajay Kumar, K. Rajani Devi, An Efficient And Robust Model For Data Leakage Detection System, Journal of Global Research in computer Science, Vol-3, No-6, June 2012 pp. 91-95
 Chapter 2 Data Leakage http://www.springer.com/978-1-4614-2052-1.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).