Data is an important asset for an enterprise. Data must be confined against loss and damage. In IT field massive amount of data is being exchanged among multiple parties at every moment. During data sharing, a great probability of data vulnerability, breach or variation exists. Along with data availability and accessibility data security is also very important. The term Data leakage is expressed as the accidental or unintentional allocation of confidential or sensitive data to a not permitted third party. This paper focuses on the data leakage concept, DLD modules & techniques to identify data leakage. A literature review for data leakage techniques is been presented in this paper. Commonly, water marking technique is used to handle the data leakage and hence causes data alteration. Distributor can allege his rights over the data if this altered watermark copy of data does exist at some not permitted location [1]. Various Data allocation strategies are in use to prevail over disadvantages for using watermark; these techniques enhance the probability of detecting guilty parties. The guilty agent(s) is an individual or a group of malicious users who cause data breach. Finally the algorithms were implemented which enhances the chance to detect guilty agents using fake objects.
CITATION STYLE
Gupta, K., & Kush, A. (2017). A Review on Data Leakage Detection for Secure Communication. International Journal of Engineering and Advanced Technology (IJEAT), (1), 2249–8958.
Mendeley helps you to discover research relevant for your work.