This paper is published in Volume-3, Issue-3, 2017
Area
Information Security
Author
Pooja A. Dagadkhair, Vidya Jagtap
Org/Univ
G H Raisoni College of Engineering and Management, Ahmednagar, Maharashtra, India
Pub. Date
23 June, 2017
Paper ID
V3I3-1588
Publisher
Keywords
Content Inspection, Data Leakage, Encryption, Parallelism, Privacy, Sampling.

Citationsacebook

IEEE
Pooja A. Dagadkhair, Vidya Jagtap. Improving the Speed of Data Leakage, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Pooja A. Dagadkhair, Vidya Jagtap (2017). Improving the Speed of Data Leakage. International Journal of Advance Research, Ideas and Innovations in Technology, 3(3) www.IJARIIT.com.

MLA
Pooja A. Dagadkhair, Vidya Jagtap. "Improving the Speed of Data Leakage." International Journal of Advance Research, Ideas and Innovations in Technology 3.3 (2017). www.IJARIIT.com.

Abstract

A human mistakes are one of the main causes of data loss.in recent year,the leak of sensitive data have grown rapidly for a research institutions.The exposure of sensitive data in storage and transmission poses a serious threat to organizational and personal security. Commonly , information is content in storage and transmission for exposed sensitive data. Such an approach usually requires the detection operation to be conducted in secretly and leakages of the data is not able to predictable. However,detecting the data leak by scanning information or files some detectors are available in to the market.(e.g. Antivirus(AV),Network Intrusion Detection System(NIDS)). In this paper, for detecting large and inexact sensitive data patterns we uses a principal component analysis algorithm and advanced encryption algorithm.Our algorithm is designed for high detection accuracy.This detection is presented by parallel execution of sampling and AES algorithm.Our system is more efficient for detection of accuracy in recognizing transform leaks.We encrypt the important data from owner and receiver side and send the data leak detection result to the owner. We describe the high encryption form both side for getting high security and maintaining the secrecy.