System to Detect Data Leakage within Organisation

Deepika S.*, Mydhili K. Nair **
* PG Scholar, Department of Information Science & Engineering, Ramaiah Institute of Technology, Bangalore, India.
** Professor, Department of Information Science & Engineering, Ramaiah Institute of Technology, Bangalore, India.
Periodicity:December - February'2018
DOI : https://doi.org/10.26634/jit.7.1.14090

Abstract

In today's technological world, leakage of confidential data within an organisation is considered as a severe crime, and is one of the major security threats in the organisations. Sharing of confidential data should be secured such that, it should not be accessed by others and also the agents to whom all the confidential data has been provided should be tracked. This paper proposes a system to identify the guilty party who has leaked the confidential data which has been distributed by the owner of the data, within the organization. To distribute the data, a data allocation strategy has been proposed which will monitor with whom all the data has been shared. To provide security for the data object and to keep track of the data lineage of the distributed data, a watermarking technique is proposed. An encrypted secret key is used to watermark the confidential data, which will be unique for every agent.

Keywords

Data Allocation Strategy, Watermarking, Encryption, Decryption.

How to Cite this Article?

Deepika, S., & Nair, M.K. (2018). System To Detect Data Leakage Within Organization. i-manager’s Journal on Information Technology, 7(1), 7-11. https://doi.org/10.26634/jit.7.1.14090

References

[1]. Artz, D. (2001). Digital steganography: Hiding data within data. IEEE Internet Computing, 5(3), 75-80.
[2]. Backes, M., Grimm, N., & Kate, A. (2016). Data Lineage in Malicious Environments. IEEE Transactions on Dependable and Secure Computing, 13(2), 178-191.
[3]. Bhattacharjya, A. K., & Ancin, H. (1999). Data embedding in text for a copier system. In Image Processing,1999.ICIP99.Proceedings.1999 International Conference on (Vol. 2, pp. 245-249). IEEE.
[4]. Bonatti, P., De Capitani di Vimercati, S., & Samarati, P. (2002). An algebra for composing access control policies. ACM Transactions on Information and System Security (TISSEC), 5(1), 1-35.
[5]. Cui, Y., & Widom, J. (2003). Lineage tracing for general data warehouse transformations. The VLDB Journal-The International Journal on Very Large Data Bases, 12(1), 41-58.
[6]. Jalil, Z., & Mirza, A. M. (2009). A review of digital watermarking techniques for text documents. In Information and Multimedia Technology, 2009. ICIMT'09. International Conference on (pp. 230-234). IEEE.
[7]. Jiansheng, M., Sukang, L., & Xiaomei, T. (2009). A digital watermarking algorithm based on DCT and DWT. In International Symposium on Web Information Systems and Applications (pp. 104-107).
[8]. Kim, Y. W., Moon, K. A., & Oh, I. S. (2003). A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics. In ICDAR (pp. 775-779).
[9]. Mascher-Kampfer, A., Stögner, H., & Uhl, A. (2006). Multiple re-watermarking scenarios. In Proceedings of the 13th International Conference on Systems, Signals, and Image Processing (IWSSIP 2006) (pp. 53-56). Budapest, Hungary.
[10]. Mstafa, R. J. (2017). Efficient and Robust Video Steganography Algorithms for Secure Data Communication (Doctoral dissertation, University of Bridgeport).
[11]. Nevase. J., Chougale, P., Shewale, S., & Bhosale, D,M. (2017). A Study on Determining Data Leakage Detection. In Imperial Journal of Interdisciplinary Research (IJIR), 2(12), 1303-1307.
[12]. Papadimitriou, P., & Garcia-Molina, H. (2011). Data leakage detection. IEEE Transactions on Knowledge and Data Engineering, 23(1), 51-63.
[13]. Su, J. K., Hartung, F., & Girod, B. (1999). Digital Watermarking of Text Image and Video Document. Telecommunications Laboratory, University of Erlangen- Nuremberg.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.