منابع مشابه
Data Leakage Detection Using Data Allocation Strategies
In the proposed system, we study unobtrusive techniques for detecting leakage of a set of objects or records .We study the following problem: consider business process outsourcing (BPO). In many cases the service provider needs access to the company intellectual property and other confidential information to carry out their services. For example a human resources BPO vendor may need access to e...
متن کاملData Leakage Detection Using Cloud Computing
In the virtual and widely distributed network, the process of handover sensitive data from the distributor to the trusted third parties always occurs regularly in this modern world. It needs to safeguard the security and durability of service based on the demand of users. The idea of modifying the data itself to detect the leakage is not a new approach. Generally, the sensitive data are leaked ...
متن کاملAudio Steganography Using LSB Edge Detection Algorithm
Digital Steganography is used to protect digital content or data such as text, images, audio and videos that have been tampered maliciously. In this paper we maintain the quality of audio and image and to ensure the ownership, we propose a new LSB (least significant bit) using edge detection in digital steganography. We apply a 2-level steganography on images and audio which make the data which...
متن کاملData Leakage Detection: A Survey
This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT. huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, l...
متن کاملDetection of Data Leakage using Misuseability Weight Measure
Data leakage is a leakage which the information’s were leaked out unknowingly. Especially company has partnership with other companies that need to share the information’s together. A distributor has a set of given sensitive data to hypothetical trusted third party agents. While sharing the transactions data leakage may occur at any place. Preventing the data leakage is a serious challenge for ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IJARCCE
سال: 2015
ISSN: 2278-1021
DOI: 10.17148/ijarcce.2015.43104