A Sensitive Data Leakage Detection and Privacy Policy Analyzing Application for Android Systems (PriVot)

Author(s):  
H. N. Atapattu ◽  
W. S. N. Fernando ◽  
J. P. A. K Somasiri ◽  
P. M. K. Lokuge ◽  
A. N. Senarathne ◽  
...  
Author(s):  
K. S. Wagh

Data is an important property of various organizations and it is intellectual property of organization. Every organization includes sensitive data as customer information, financial data, data of patient, personal credit card data and other information based on the kinds of management, institute or industry. For the areas like this, leakage of information is the crucial problem that the organization has to face, that poses high cost if information leakage is done. All the more definitely, information leakage is characterize as the intentional exposure of individual or any sort of information to unapproved outsiders. When the important information is goes to unapproved hands or moves towards unauthorized destination. This will prompts the direct and indirect loss of particular industry in terms of cost and time. The information leakage is outcomes in vulnerability or its modification. So information can be protected by the outsider leakages. To solve this issue there must be an efficient and effective system to avoid and protect authorized information. From not so long many methods have been implemented to solve same type of problems that are analyzed here in this survey.  This paper analyzes little latest techniques and proposed novel Sampling algorithm based data leakage detection techniques.


Author(s):  
MAMTA SINGH ◽  
PRITI TRIPATHI ◽  
RENUKA SINGH

Sometimes sensitive data must be handed over to supposedly trust third parties. With the extensive application of database systems, the owners of the databases have urgent requirements to protect their copyright of databases. Some of the data is leaked and found in an unauthorized place the distributor must assess the likelihood that the leaked data came from one or more users. This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. In the field of IT huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, leakage or alteration. So, to prevent these problems, detection of data leakage system has been proposed. This paper includes brief idea about data leakage detection and a methodology to detect the data leakage persons. Data leakage is the main hindrance in data distribution. Traditionally this data leakage is handled by watermarking technique which requires modification of data.


2021 ◽  
Vol 2021 ◽  
pp. 1-19
Author(s):  
Ming Di ◽  
Shah Nazir ◽  
Fucheng Deng

The wide-ranging implementation of Android applications used in various devices, from smartphones to intelligent television, has made it thought-provoking for developers. The permission granting mechanism is one of the defects imposed by the developers. Such assessing of defects does not allow the user to comprehend the implication of privacy for granting permission. Mobile applications are speedily easily reachable to typical users of mobile. Despite possible applications for improving the affordability, availability, and effectiveness of delivering various services, it handles sensitive data and information. Such data and information carry considerable security and privacy risks. Users are usually unaware of how the data can be managed and used. Reusable resources are available in the form of third-party libraries, which are broadly active in android apps. It provides a diversity of functions that deliver privacy and security concerns. Host applications and third-party libraries are run in the same process and share similar permissions. The current study has presented an overview of the existing approaches, methods, and tools used for influencing user behavior concerning android privacy policy. Various prominent libraries were searched, and their search results were analyzed briefly. The search results were presented in diverse perspectives for showing the details of the work done in the area. This will help researchers to offer new solutions in the area of the research.


2021 ◽  
Vol 11 (2) ◽  
pp. 321-328
Author(s):  
Prisca I. Okochi ◽  
Stanley A. Okolie ◽  
Juliet N. Odii

An Improved Data Leakage Detection System is designed to mitigate the leakage of crucial and sensitive data in a cloud computing environment. Generally, leakage of data in computing system has caused a lot of irreparable damage or catastrophe to various institutions or organizations worldwide. Therefore, this research aims at detecting and preventing any intentional or non-intentional data leakages using dynamic password or key for data decryption security mechanisms. To achieve this the OOADM methodology was adopted. The new system was implemented using ASP.net MVC and Microsoft SQL Server Management Studio as the backend. And by incorporating an Audit trail/Transaction log mechanism, the new system monitors the activities within and outside the computing environment with date and time stamp. Hence, the system can be applied in any environment for the prevention and detection of any data leakage.


2014 ◽  
Vol 1049-1050 ◽  
pp. 1154-1158
Author(s):  
Xue Fei Jia ◽  
Ning Bu ◽  
Shang Gao ◽  
Tao Li

Sensitive data has a great influence on our daily lives. Once the leakage of sensitive data occurred, the timely detection and response is of great importance. This article puts forward the concept of boundary detection based on the black box testing. And with the idea of boundary detection, a cross-platform sensitive data leakage detection system is built.


Author(s):  
Meng Shanshan ◽  
Song Yubo ◽  
Chen Fei ◽  
Yang Xiaohui ◽  
Zhu Kelong

2020 ◽  
Vol 7 (4) ◽  
pp. 018-023
Author(s):  
N. I. Dudkin ◽  
◽  
V. I. Nikonov ◽  

Sensitive data of a person, when agreeing with the privacy policy in services that carry out instant messages, are the main subject of protection. The relevance of this article lies in the main aspects of organizing the protection of sensitive user data, since their main and important property is confidentiality. The article discusses procedures related to sensitive data and possible threats to their transfer and use. The purpose of the article is to review and classify current threats to sensitive data of users of the most popular applications on the territory of the Russian Federation, to study and analyze studies that offer various methods of protection against the threats considered in this work.


Sign in / Sign up

Export Citation Format

Share Document