Enhance Security Privacy Preserving for Content Leaks

Authors

  • Shradha V. Raghorte Student, M.Tech.(CSE), R.C.E.R.T Chandrapur, India
  • Rahila Sheikh CSE Department, R.C.E.R.T Chandrapur, India

DOI:

https://doi.org/10.53555/cse.v3i7.154

Keywords:

Information leak detection, content inspection, sampling, alignment, dynamic programming.

Abstract

The information leak of sensitive data on systems has a serious threat to organization data security.Statistics show that the improper encryption on files and communications due to human errors is one of the leading causes of information loss. So there a need tools to identify the exposure of sensitive data by monitoring the content in storage and transmission. However, detecting the exposure of sensitive data information is challenging due to data transformation in the content. Transformations result in highly unpredictable leak patterns. In this paper, it is utilize sequence alignment techniques used for detecting complex data-leak patterns. This algorithm is designed for detecting long and inexact sensitive data patterns. This detection is paired with a comparable sampling algorithm, which allows one to compare the similarity of two separately sampled sequences. The system achieves good detection accuracy in recognizing transformed leaks. It implement a parallelized version of our algorithms in  graphics processing unit to achieves high analysis data. In the case of collective privacy preservation, organizations have to cope with some interesting conflicts. For instance, when personal information undergoes analysis processes that produce new facts about users' shopping patterns, hobbies, or preferences, these facts could be used in recommender systems to predict or affect their future shopping patterns. In general, this scenario is beneficial to both users and organizations. However, when organizations share data in a collaborative project, the goal is not only to protect personally identifiable information but also sensitive knowledge represented by some strategic patterns.

Downloads

Download data is not yet available.

References

Hiroki Nishiyama, Desmond Fomo, Zubair Md. Fadlullah,, and NeiKato,Fellow,” Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks” IEEE Transaction on Parallel and Distributed System , Volume 25, No 2 Feb 2014

K. Ramya, D. RamyaDorai, Dr. M. Rajaram “Tracing Illegal Redistributors of Streaming Contents using Traffic Patterns” IJC A 2011.

A. Asano, H. Nishiyama, and N. Kato, “The Effect of Packet Reordering and Encrypted Traffic on Streaming Content Leakage Detection” Proc. Int’l Conf. Computer Comm. Networks (ICCCN ’10), pp. 1 6, Aug. 2010.

Y. Chu, S.G. Rao, S. Seshan, and H. Zhang, “Enabling Conferencing Applications on the Internet Using an overlay Multicast Architecture,” Proc.ACM SIGCOMM, pp. 55 67,Aug. 2010

O. Adeyinka, “Analysis of IPSec VPNs Performance in a Multimedia Environment,” Proc. Fourth Int’l Conf. Intell igent Environments, pp. 25- 30, 2008

M. Dobashi, H. Nakayama, N. Kato, Y. Nemoto, and A. Jamalipour, “Traitor Tracing Technology of Streaming Contents Delivery Using Traffic Pattern in Wired/Wireless Environments,” Proc. IEEE Global Telecomm. Conf., pp. 1 5, Nov./Dec. 2006.

S. Amarasing and M. Lertwatechakul, “The Study of Streaming Traffic Behavior,” KKU Eng. J., vol. 33, no. 5, pp. 541 553, Sept./Oct. 2006.

R.S. Naini and Y. Wang, “Sequential Traitor Tracing,” IEEE Trans. Information Theory, vol. 49, no. 5, pp. 1319 1326, May 2003.

D. Geiger, A. Gupta, L.A. Costa, and J. Vlontzos, “Dynamic Programming for Detecting, Tracking, and Matching Deformable C ontours,” Proc. IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 17, no. 3, pp. 294 302, M ar. 1995.

H. A. Kholidy, F. Baiardi, and S. Hariri, “DDSGA: A data-driven semi-global alignment approach for detecting masquerade attacks,” IEEE Trans. Dependable Secure Comput., vol. 12, no. 2, pp. 164–178, Mar./Apr. 2015.

S. F. Altschul, W. Gish, W. Miller, E. W. Myers, and D. J. Lipman, “Basic local alignment search tool,” J. molecular Biol., vol. 215, no. 3, pp. 403–410, Oct. 1990.

Downloads

Published

2017-07-31

How to Cite

Raghorte, S. V., & Sheikh, R. (2017). Enhance Security Privacy Preserving for Content Leaks. International Journal For Research In Advanced Computer Science And Engineering, 3(7), 01–05. https://doi.org/10.53555/cse.v3i7.154