Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

“Security privacy preserving for content leaks”

Author : Shradha V. Raghorte 1 Dr . Rahila Sheikh 2

Date of Publication :10th August 2017

Abstract: The information leak of sensitive data on systems has a serious threat to organization data security. Statistics show that the improper encryption on files and communications due to human errors is one of the leading causes of information loss. So there a need tools to identify the exposure of sensitive data by monitoring the content in storage and transmission. However, detecting the exposure of sensitive data information is challenging due to data transformation in the content. Transformations result in highly unpredictable leak patterns. In this paper, it is utilize sequence alignment techniques used for detecting complex data-leak patterns. This algorithm is designed for detecting long and inexact sensitive data patterns. This detection is paired with a comparable sampling algorithm, which allows one to compare the similarity of two separately sampled sequences. The system achieves good detection accuracy in recognizing transformed leaks. It implement a parallelized version of our algorithms in graphics processing unit to achieves high analysis data. In the case of collective privacy preservation, organizations have to cope with some interesting conflicts. For instance, when personal information undergoes analysis processes that produce new facts about users' shopping patterns, hobbies, or preferences, these facts could be used in recommender systems to predict or affect their future shopping patterns. In general, this scenario is beneficial to both users and organizations. However, when organizations share data in a collaborative project, the goal is not only to protect personally identifiable information but also sensitive knowledge represented by some strategic patterns.

Reference :

    1. Hiroki Nishiyama, Desmond Fomo, Zubair Md. Fadlullah,, and NeiKato,Fellow,” Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks” IEEE Transaction on Parallel and Distributed System , Volume 25, No 2 Feb 2014
    2. K. Ramya, D. RamyaDorai, Dr. M. Rajaram “Tracing Illegal Redistributors of Streaming Contents using Traffic Patterns” IJC A 2011.
    3. A. Asano, H. Nishiyama, and N. Kato, “The Effect of Packet Reordering and Encrypted Traffic on Streaming Content Leakage Detection” Proc. Int’l Conf. Computer Comm. Networks (ICCCN ’10), pp. 1 6, Aug. 2010.
    4. Y. Chu, S.G. Rao, S. Seshan, and H. Zhang, “Enabling Conferencing Applications on the Internet Using an Overlay Multicast Architecture,” Proc.ACM SIGCOMM, pp. 55 67,Aug. 2010
    5. O. Adeyinka, “Analysis of IPSec VPNs Performance in a Multimedia Environment,” Proc. Fourth Int’l Conf. Intell igent Environments, pp. 25 - 30, 2008
    6. M. Dobashi, H. Nakayama, N. Kato, Y. Nemoto, and A. Jamalipour, “Traitor Tracing Technology of Streaming Contents Delivery Using Traffic Pattern in Wired/Wireless Environments,” Proc. IEEE Global Telecomm. Conf., pp. 1 5, Nov./Dec. 2006.
    7. S. Amarasing and M. Lertwatechakul, “The Study of Streaming Traffic Behavior,” KKU Eng. J., vol. 33, no. 5, pp. 541 553, Sept./Oct. 2006.
    8. R.S. Naini and Y. Wang, “Sequential Traitor Tracing,” IEEE Trans. Information Theory, vol. 49, no. 5, pp. 1319 1326, May 2003.
    9. D. Geiger, A. Gupta, L.A. Costa, and J. Vlontzos, “Dynamic Programming for Detecting, Tracking, and Matching Deformable C ontours,” Proc. IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 17, no. 3, pp. 294 302, M ar. 1995.
    10. H. A. Kholidy, F. Baiardi, and S. Hariri, “DDSGA: A data-driven semi-global alignment approach for detecting masquerade attacks,” IEEE Trans. Dependable Secure Comput., vol. 12, no. 2, pp. 164–178, Mar./Apr. 2015.
    11. S. F. Altschul, W. Gish, W. Miller, E. W. Myers, and D. J. Lipman, “Basic local alignment search tool,” J. Molecular Biol., vol. 215, no. 3, pp. 403–410, Oct. 1990
    12. V. P. Kemerlis, V. Pappas, G. Portokalidis, and A. D. Keromytis, “iLeak: A lightweight system for detecting inadvertent information leaks,” in Proc. 6th Eur. Conf. Comput. Netw. Defense, Oct. 2010, pp. 21–28.
    13. E. Bertino and G. Ghinita, “Towards mechanisms for detection and prevention of data exfiltration by insiders: Keynote talk paper,” in Proc. 6th ACM Symp. Inf., Comput. Commun. Secur. (ASIACCS), 2011, pp. 10–19.
    14. P. Papadimitriou and H. Garcia-Molina, “Data leakage detection,” IEEE Trans. Knowl. Data Eng., vol. 23, no. 1, pp. 51–63, Jan. 2011.
    15. D. Lin and A. Squicciarini, “Data protection models for service provisioning in the cloud,” in Proc. 15th ACM Symp. Access Control Models Technol., 2010, pp. 183–192
    16. M. O. Rabin, “Fingerprinting by random polynomials,” Center Res. Comput. Technol., Harvard Univ., Cambridge, MA, USA, Tech. Rep. 15-81, 1981.
    17. T. F. Smith and M. S. Waterman, “Identification of common molecular subsequences,” J. Molecular Biol., vol. 147, no. 1, pp. 195–197, Mar. 1981.
    18. C. Kalyan and K. Chandrasekaran, “Information leak detection in financial e-mails using mail pattern analysis under partial information,” in Proc. 7th WSEAS Int. Conf. Appl. Informat. Commun. (AIC), vol. 7. 2007, pp. 104–109.
    19. C. Wüest and E. Florio, “Firefox and malware: When browsers attack,” Symantec Corp., Mountain View, CA, USA, White Paper, Oct. 2009. [Online]. Available: https://www.symantec.com/content/en/us/enterprise/ media/security_response/whitepapers/firefox_and_malwa re.pdf, accessed Feb. 2015.

Recent Article