A Review on Data Leakage Detection for Secure Communication
Kishu Gupta1, Ashwani Kush2

1Kishu Gupta, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra-136119, India.
2Dr. Ashwani Kush, University College, Kurukshetra University, Kurukshetra-136119, India.

Manuscript received on 10 October 2017 | Revised Manuscript received on 18 October 2017 | Manuscript Published on 30 October 2017 | PP: 153-159 | Volume-7 Issue-1, October 2017 | Retrieval Number: A5214107117/17©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Data is an important asset for an enterprise. Data must be confined against loss and damage. In IT field massive amount of data is being exchanged among multiple parties at every moment. During data sharing, a great probability of data vulnerability, breach or variation exists. Along with data availability and accessibility data security is also very important. The term Data leakage is expressed as the accidental or unintentional allocation of confidential or sensitive data to a not permitted third party. This paper focuses on the data leakage concept, DLD modules & techniques to identify data leakage. A literature review for data leakage techniques is been presented in this paper. Commonly, water marking technique is used to handle the data leakage and hence causes data alteration. Distributor can allege his rights over the data if this altered watermark copy of data does exist at some not permitted location [1]. Various Data allocation strategies are in use to prevail over disadvantages for using watermark; these techniques enhance the probability of detecting guilty parties. The guilty agent(s) is an individual or a group of malicious users who cause data breach. Finally the algorithms were implemented which enhances the chance to detect guilty agents using fake objects.
Keywords: Data Leakage, Data Leakage Detection, Data Leakage Prevention, Encryption, Watermarking

Scope of the Article: Data Mining