Abstract
The increase use of data in the businesses have proved to be profitable but also provides serious threats in form of data leakage, protection and infringement. The company provides sensitive data to the employees but the data is most likely to be leaked. Data protection must be provided to all forms of data. Data protection should be provided in such a way that it strikes balance between data allowance and data rights to the user as well as owner. The level or extent of protection varies with methods used. In this review paper, numerous methods for protecting data from leakage, unauthorized access, unfair use etc. are compared.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Papadimitriou, P., Garcia-Molina, H.: A study on video browsing strategies. IEEE Trans. Knowl. Data Eng. 23(1) (2011)
Lahoud, H.A., Tang, X.: Information security labs in IDS/IPS for distance education. In: SIGITE 2006 (2006)
Dhiren, M., Joshi, H., Patel, B.K.: Towards application classification with vulnerability signature for IDS/IPS. In: SecurIT 2012 (2012)
Williamson, S.A., Varakantham, P., Gao, D., Chen, O.: Active malware analysis using stochastic games. In: 11th International Conference on Autonomous Agents and Multiagent Systems—Innovative Applications Track, AAMAS (2012)
Wikipedia. http://en.wikipedia.org/wiki/WikiLeaks (2008). Frost, Sullivan. World Data Leakage Prevention Market. Technical report ND34D-74
IDS AND IPS Placement for Network Protection. http://www.infosecwriters.com/text_resources/pdf/
Rutkowska, J.: Introducing stealth malware taxonomy. COSEINC (2006)
SearchSecurity. http://searchsecurity.techtarget.com/definition/security-information-and-event-management-SIEM
Ye, Y., Li, T., Zhu, S., Zhuang, W., Tas, E., Gupta, U., Abdulhayoglu, M.: Combining file content and file relations for cloud based malware detection. In: KDD 2011 (2011)
Kale, S.A., Kulkarni, S.V.: Data leakage detection: a survey. IOSR J. Comput. Eng. (IOSRJCE) 1(6), 32–35 (2012)
Umamaheswari, S., Geetha, H.A.: Detection of guilty agents. In: Proceedings of National Conference on Innovations Emerging Technology (2011)
Mishra, R., Chitre, R.K.: Data leakage and detection of guilty agent. Int. J. Sci. Eng. Res. (2012)
Kale, S.A., Kulkarni, S.V.: Data leakage detection. Int. J. Adv. Res. Comput. Commun. Eng. 1(9), 668–678 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kaushik, D., Mathew, R. (2020). Review of Data Protection Technique. In: Pandian, A.P., Senjyu, T., Islam, S.M.S., Wang, H. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018). ICCBI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 31. Springer, Cham. https://doi.org/10.1007/978-3-030-24643-3_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-24643-3_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24642-6
Online ISBN: 978-3-030-24643-3
eBook Packages: EngineeringEngineering (R0)