International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 3 | Mar -2017
p-ISSN: 2395-0072
www.irjet.net
STRATEGIES FOR DATA LEAKAGE PREVENTION Anirudh Garg, Ashish Kumar, Pradeep Kumar H. S. Department of Information Science and Engineering, National Institute of Engineering, Mysore, India Assistant Professor, Department of Information Science and Engineering, National Institute of Engineering, Mysore, India ---------------------------------------------------------------------***--------------------------------------------------------------------2. LITERATURE SURVEY Abstract - In today's world knowledge is power so data leakage has become a major concern for any organization or an individual who doesn't want their information or data to be leaked to outsiders who they did not want to divulge the information, but they cannot be sure that the employees working under them will have the best interest of the organization and won't put their personal agendas in front so to we want to prevent any confidential information to not leave the premises of the organization to ensure that we protect the data with the help of a firewall which will scan all the outgoing messages sent by the employee if the transfer is not authorized by the administrator the employee will be reported and there will be repercussions for his/her actions this is a very important procedure in present day organizations because by the time we detect that data has been leaked it may be too late to take any action so we need to be one step ahead of the problem. It involves a firewall ,keyword-recognition and identifying the guilty agent.
Now a day's most of the businesses be it minute or multinational all are making use of the network in some form or the other this can be seen by the booming use of the cloud to store the data of the companies in the cloud storage which are more flexible i.e. they can be accessed remotely and can add storage value to it, then to be stored in physical drives, cloud is being used by most of the notable companies , marketplace and academic world. number of notable commercial and individual cloud computing services, e.g., form Amazon, Google, Microsoft, Yahoo, and Sales force. Also, top database vendors, like Oracle, as they are adding cloud support to their databases.
1.INTRODUCTION In this paper, we develop a model for protecting the information that we want to protect and we are going to see how the data can be leaked and what measures our data leakage prevention implementations reduce these threats, we are also going to make a software which will help us prevent data leakage. As we have seen data leakage is a major concern because in present information is power, so we have designed a software in which the admin or the administrator (distributor) can send the message like an email, message via some other service to an agent or multiple agents now if that agent wants to send that data to some unauthorized person or we can say if he wants to leak the data to someone outside the company which may or may not cause harm to the company itself, as he is not authorized to send this data to anyone, the firewall that we have installed in the pc of the employees will scan the whole document and will determine whether the file or information that the employee is trying to share is in his jurisdiction or if he is trying to send a data with confidential information, this will be determined by scanning the document and determining how many keywords have matched with the document and if the firewall gets a red-flag(if it gets a common keyword) the employee's ID will be sent to the administrator and then it's up to the administrator to decide if he wants to take action and if he does how severe the consequences.
Š 2017, IRJET
|
Impact Factor value: 5.181
|
The providers are enjoying the opportunity to be able to build a market to sell cloud space or storage to the people who are willing to buy for a relatively low-cost as compared to physical storages, these low-cost and pay for use cloud can only work if the providers are able to provide the required amount of protection to the data. quick provisioning, quick flexibility, everywhere network contact, hypervisor defense against network vulnerability, economical failure recovery and data storage solution, on-request security checks, synchronized detection of system altering and rapid reconstruction of services. The cloud provides this compensation, until some of the risks are better understood. The basic concept of the cloud , based on the services they offer, form application service provisioning, grid and service computing, to Software as a Service. Despite of the specific architecture, the dominant concept of this computing model is that customers’ data, which can be of individuals, organizations or enterprises, is processed remotely in unknown machines about which the user not aware. The ease and efficiency of this approach, however, comes with privacy and security risks. Confidentiality of data is the main hurdle in implementation of cloud services[1].
3.EXISTING SYSTEMS Data Leakage Prevention (DLP) is a very integral part of our society because we need to not only punish who are trying to access restricted information but we have to take every precaution that it does not happen in the first place, so that why we have some of the data leakage prevention strategies which are in place in our present society.
ISO 9001:2008 Certified Journal
|
Page 643