Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat

14Citations
Citations of this article
80Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Data leakage is a problem that companies and organizations face every day around the world. Mainly the data leak caused by the internal threat posed by authorized personnel to manipulate confidential information. The main objective of this work is to survey the literature to detect the existing techniques to protect against data leakage and to identify the methods used to address the insider threat. For this, a literature review of scientific databases was carried out in the period from 2011 to 2022, which resulted in 42 relevant papers. It was obtained that from 2017 to date, 60% of the studies found are concentrated and that 90% come from conferences and publications in journals. Significant advances were detected in protection systems against data leakage with the incorporation of new techniques and technologies, such as machine learning, blockchain, and digital rights management policies. In 40% of the relevant studies, significant interest was shown in avoiding internal threats. The most used techniques in the analyzed DLP tools were encryption and machine learning.

Cite

CITATION STYLE

APA

Herrera Montano, I., García Aranda, J. J., Ramos Diaz, J., Molina Cardín, S., de la Torre Díez, I., & Rodrigues, J. J. P. C. (2022). Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat. Cluster Computing, 25(6), 4289–4302. https://doi.org/10.1007/s10586-022-03668-2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free