Tracking Down Data Leakage by Using Encrypted Fake Objects

Download Now
Provided by: International Journal of Computer Science and Mobile Computing (IJCSMC)
Topic: Security
Format: PDF
In this paper, the authors contain concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT, huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, leakage or alteration. So, to prevent these problems, a data leakage detection system has been proposed. This paper includes brief idea about data leakage detection and a methodology to detect the data leakage persons.
Download Now

Find By Topic