2016
DOI: 10.18517/ijaseit.6.5.997
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Prevention of Sensitive Data From Data Leak Using Shingling and Rabin Filter

Abstract: Data leak is a major problem in all the organization of any land. A deliberate risk to institution and private security is the disclosure of secure data in transmission and storage. To check content for exposed sensitive data is the main aim for exposed sensitive data. There are large numbers of data-leak cases but human flaws are one of the main reasons of data leak. This paper proposed a data-leak detection model for preventing accidental and intentional data leak in network. If someone succeed to steal some… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…The first introduction of RIDIT was to classify borderline cases in a behavioural science study of a categorical dataset [16]. The reference group is a random data taken from large sample observations [23]. The evolution of RIDIT then continued by other researchers.…”
Section: Methodsmentioning
confidence: 99%
“…The first introduction of RIDIT was to classify borderline cases in a behavioural science study of a categorical dataset [16]. The reference group is a random data taken from large sample observations [23]. The evolution of RIDIT then continued by other researchers.…”
Section: Methodsmentioning
confidence: 99%
“…A contiguous subsequence contained in D is called a shingle [9,10]. Given a document D, we can associate to it, its w-shingling defined as the bag (multiset) of all shingles of size w contained in D. So for instance the 4-shingling of(a,rose,is,a,rose,is,a,rose) is the bag{(a,rose,is,a); (rose,is,a,rose); (is,a,rose,is);(a,rose,is,a); (rose,is,a,rose)}.…”
Section: K-shinglementioning
confidence: 99%
“…Therefore this system implemented to enables the data owner to detect and prevent data leak. The results show that approach can provide accurate detection with a small number of false alarm [19]. Suggest a step to reshape the policy in order to develop a data protection that leads to creating better confidence for the user, therefore adopted a survey questionnaire methodology by clients [20].…”
Section: Introductionmentioning
confidence: 99%