Book Details

A Framework for Privacy Data Protection against Attack

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

Among different information release cases, human oversights are one of the fundamental drivers of information misfortune. There exist arrangements identifying coincidental touchy information spills caused by human mix ups and to give cautions to associations. A typical approach is to screen content away and transmission for uncovered touchy data. Such an approach normally requires the discovery activity to be directed in mystery. Be that as it may, this mystery necessity is trying to fulfill practically speaking, as discovery servers might be imperiled or outsourced. Actualizing the framework for the location of spilled information and conceivably the specialist who is in charge of spillage of information. The merchant must access the spilled information originated from at least one specialists. In a few events, the information appropriated by the merchant are duplicated by various specialists who make a gigantic harm the organization and this procedure of losing the information is known as information spillage. They plan a rough calculation to proficiently produce likeness saving marks for information lumps in view of MinHash and Bloom filter, and furthermore outline a capacity to register the data spillage in view of these marks. Next, show a compelling stockpiling design age calculation in light of grouping for appropriating information pieces with negligible data spillage over numerous mists. The experimental result demonstrates that our technique can bolster precise location with a modest number of false cautions under different information spill situations.

References

[1] K. Borders and A. Prakash, ?Quantifying information leaks in outbound web traffic,? in Proceedings of the 30th IEEE Symposium on Security and Privacy, 2009, pp. 129–140.

[2] H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, ?Panorama: capturing system-wide information flow for malware detection and analysis,? in Proceedings of the 14th ACM conference on Computer and Communications Security, 2007, pp. 116–127.

[3] K. Borders, E. V. Weele, B. Lau, and A. Prakash, ?Protecting confidential data on personal computers with storage capsules,? in Proceedings of the 18th USENIX Security Symposium, 2009, pp. 367–382.

[4] A.Nadkarni and W. Enck, ?Preventing accidental data disclosure in modern operating systems,? in Proceedings of the 20th ACM conference on Computer and Communications Security, 2013, pp. 1029–1042.

[5] A.Kapravelos, Y. Shoshitaishvili, M. Cova, C. Kruegel, and G. Vigna, ?Revolver: An automated approach to the detection of evasive web-based malware,? in Proceedings of the 22nd USENIX Security Symposium, 2013.

[6] X. Jiang, X. Wang, and D. Xu, ?Stealthy malware detection and monitoring through VMM-based ?out-of-the-box? semantic view reconstruction,? ACM Transactions on Information and System Security, vol. 13, no. 2, p. 12, 2010.

[7] G. Karjoth and M. Schunter, ?A privacy policy model for enterprises,? in Proceedings of the 15th IEEE Computer Security Foundations Workshop, June 2002, pp. 271–281.

[8] J. Jung, A. Sheth, B. Greenstein, D. Wetherall, G. Maganis, and T. Kohno, ?Privacy oracle: a system for finding application leaks with black box differential testing,? in Proceedings of the 15th ACM conference on Computer and Communications Security, 2008, pp. 279– 288.

[9] Emmanuel Muller; Ira Assent; Uwe Steinhausen; Thomas Seidl, ? OutRank: ranking outliers in high dimensional data?, Data Engineering Workshop, 2008. ICDEW 2008. IEEE 24th International Conference on, Year: 2008

[10] Hengshu Zhu; Chuanren Liu; Yong Ge; Hui Xiong; Enhong Chen, ?Popularity Modeling for Mobile Apps: A Sequential Approach?, IEEE Transactions on Cybernetics, Year: 2015, Volume: 45, Issue: 7

[11] Nai-Wei Lo; Kuo-Hui Yeh; Chuan-Yen Fan, ?Leakage Detection and Risk Assessment on Privacy for Android Applications: LRPdroid?, IEEE Systems Journal, Year: 2014, Volume: PP, Issue: 99.

[12] Geumhwan Cho; Junsung Cho; Youngbae Song; Hyoungshick Kim, ?An Empirical Study of Click Fraud in Mobile Advertising Networks?, Availability, Reliability and Security (ARES), 2015 10th International Conference on, Year: 2015.

[13] Mustafa Haciosman; Bin Ye; Gareth Howells, ?Protecting and Identifiying Smartphone Apps Using Icmetrics?, Emerging Security Technologies (EST), 2014 Fifth International Conference on, Year: 2014.

[14] Hossen Mustafa; Wenyuan Xu; Ahmad Reza Sadeghi; Steffen Schulz, ?You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks?, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Year: 2014.

[15] Soo Ling Lim; Peter J. Bentley, ? Investigating app store ranking algorithms using a simulation of mobile appecosystems?, 2013 IEEE Congress on Evolutionary ComputationYear: 2013.

Keywords

Data protection, Security, Data leakage

Image
  • Format Volume 6, Issue 1, No 2, 2018
  • Copyright All Rights Reserved ©2018
  • Year of Publication 2018
  • Author V.Geetha, Dr.P.Mohammed Shareef, M.Kugasri
  • Reference IJCS-335
  • Page No 2225-2231

Copyright 2024 SK Research Group of Companies. All Rights Reserved.