Detection of Sensitive Data and Information Leakage in a Trusted System |
Author(s): |
Reshma K Rajan , MBCCET PEERMADE, IDUKKI, KERALA, INDIA; Sijimol A S, MBCCET PEERMADE,IDUKKI,KERALA, INDIA |
Keywords: |
DLD Provider, Data duplication, File Leakage Detection |
Abstract |
Data-leak issues have developed quickly. Among different information release cases, human missteps are one of the primary drivers of information loss. It contains a Privacy Preserving Data-Leak Detection (DLD) solution to solve the data leak issue where it scans the characters of the pattern from right to left beginning with the rightmost one. Detection of sensitive data and information leakage in a trusted system is possible using Boyer Moore algorithm. Boyer Moore algorithm allows supporting the pattern matching. Proposes the Hash to Hash Value Comparison concept which lowers the execution time of string with the help of hash to hash match. First the hash value of the string corresponding to the content has been calculated. Then split up the string, word by word or as per the wish and taking the hash value of that split up string and then it compares with the previous hash value. If the hash values match with each other then the alert message is passed from the DLD Provider which detects the file duplication or file leakage to the data owner and the data user. This method detects the false alarm rate and reduce the execution time while it comparing with Boyer Moore Algorithm. |
Other Details |
Paper ID: IJSRDV6I21482 Published in: Volume : 6, Issue : 2 Publication Date: 01/05/2018 Page(s): 2618-2621 |
Article Preview |
|
|