Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/570954
Title: | Dynamically Configurable Document Model to Prevent Data Leakage |
Researcher: | Shivakumara, T |
Guide(s): | Patil, Rajshekhar M |
Keywords: | Computer Science Computer Science Interdisciplinary Applications Engineering and Technology |
University: | Visvesvaraya Technological University, Belagavi |
Completed Date: | 2023 |
Abstract: | Recent advancement in the technology has given insights to data security research. As the data storage grows, the threats also increase. Data leakage is one of the most prime importance to be monitored by the organizations because, the enterprises and their businessess and business decision more rely on the data generating in the organization day by day. Since, organizations have to give up some credentials to the employee or vendors to access their sensitive data based on their roles. Organizations are facing difficulty in monitoring the internal employee threats. Several researchers have come up with variety of approaches to prevent data leakage. There are several Data Leakage Detection and Data Leakage Prevention techniques for securing and protecting data. A recently proposed technique addresses the issue of data leakage in transferred data by sampling and matching techniques. This includes different types of algorithms to detect and prevent data leak are either partially or fully. This is more effective than the currently available method in terms of the level of information loss. The proposed approach performs prediction and probability finding in order to identify and protect data from leakers. The experimental result shows the effective results on the distributed data in email security. Today s world needs most of the things would be automated, the machine would be able to do itself everything by its own, from initiation of job to till the decision-making capabilities. Similarly, the Security of the data needs the automated, self-decision and self-protective proactive mechanisms. Since, the existing tools and mechanisms are semi-automated still it needs the human intervention to update and configure the security layers and features. This work gives the mechanism of preventing data leakage by automated machine host based runtime system. Already the few of the data leakage Prevention techniques in place to monitor the behavior of their employees, and users, those who have the credentials to enter into the o |
Pagination: | 141 |
URI: | http://hdl.handle.net/10603/570954 |
Appears in Departments: | Department of Computer Application |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 223.32 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 995.83 kB | Adobe PDF | View/Open | |
03_content.pdf | 349.28 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 236.38 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 596.3 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 400.28 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 236.37 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 434.6 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 305.97 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 388.35 kB | Adobe PDF | View/Open | |
11_chapter 6.pdf | 379.6 kB | Adobe PDF | View/Open | |
12_chapter 7.pdf | 713.07 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 128.32 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: