全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

A Review on Distribution Model for Mobile Agent-Based Information Leakage Prevention

DOI: 10.4236/cn.2021.132006, PP. 68-78

Keywords: Mobile Agent, Distribution Model, Data Leakage Detection, Data Leakage Prevention, DLP, Security, Distributed Computing

Full-Text   Cite this paper   Add to My Lib

Abstract:

With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention have become important in a distributed environment. In this aspect, mobile agent-based systems are one of the latest mechanisms to identify and prevent the intrusion and leakage of the data across the network. Thus, to tackle one or more of the several challenges on Mobile Agent-Based Information Leakage Prevention, this paper aim at providing a comprehensive, detailed, and systematic study of the Distribution Model for Mobile Agent-Based Information Leakage Prevention. This paper involves the review of papers selected from the journals which are published in 2009 and 2019. The critical review is presented for the distributed mobile agent-based intrusion detection systems in terms of their design analysis, techniques, and shortcomings. Initially, eighty-five papers were identified, but a paper selection process reduced the number of papers to thirteen important reviews.

References

[1]  British Broadcasting Corporation (BBC) (2014) Target Data Theft Affected 70 Million Customers.
[2]  Verizon (2015) Data Breach Investigations.
[3]  Alneyadi, S., Sithirasenan, E. and Muthukkumarasamy, V. (2016) A Survey on Data Leakage Prevention Systems. Journal of Network and Computer Applications, 62, 137-152.
https://doi.org/10.1016/j.jnca.2016.01.008
[4]  Alneyadi, S., Sithirasenan, E. and Muthukkumarasamy, V. (2015) Detecting Data Semantic: A Data Leakage Prevention Approach. 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, 20-22 August 2015, 910-917.
https://doi.org/10.1109/Trustcom.2015.464
[5]  Margathavall, R.M.P., Pramila, V., Priya, R. and Abiram, P. (2016) Preserving Sensitive Data By Data Leakage Prevention Using Attribute-Based Encryption Algorithm. International Journal of Emerging Technology in Computer Science & Electronics, 21, 3.
[6]  Greenwald, G., MacAskill, E. and Poitras, L. (2013) Edward Snowden: The Whistleblower behind the NSA Surveillance Revelations. The Guardian, 9, 2.
[7]  Mortensen, M. (2014) Who Is Surveilling Whom? Negotiations of Surveillance and Sousveillance in Relation to Wikileaks’ Release of the Gun Camera Tape Collateral Murder. Photographies, 7, 23-37.
https://doi.org/10.1080/17540763.2014.896144
[8]  Costante, E., Fauri, D., Etalle, S., Den Hartog, J. and Zannone, N. (2016) A Hybrid Framework for Data Loss Prevention and Detection. 2016 IEEE Security and Privacy Workshops, San Jose, 22-26 May 2016, 324-333.
https://doi.org/10.1109/SPW.2016.24
[9]  Ren, L. (2013) DLP Systems: Models, Architecture and Algorithms. 19-21.
[10]  Shabtai, A., Elovici, Y. and Rokach, L. (2012) A Survey of Data Leakage Detection and Prevention Solutions. Springer Science & Business Media, Boston.
https://doi.org/10.1007/978-1-4614-2053-8
[11]  Raman, P., Kayacık, H.G. and Somayaji, A. (2011) Understanding Data Leak Prevention. 6th Annual Symposium on Information Assurance, Albany, 7-8 June 2011, 27.
[12]  Yin, F., Yu, R., Wang, L. and Ma, X. (2013) A Distribution Model for Data Leakage Prevention. Proceedings of 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer, Shenyang, 20-22 December 2013, 2617-2620.
https://doi.org/10.1109/MEC.2013.6885474
[13]  Lee, Y.-C., Bishop, S., Okhravi, H. and Rahimi, S. (2009) Information Leakage Detection in Distributed Systems Using Software Agents. 2009 IEEE Symposium on Intelligent Agents, Nashville, 30 March-2 April 2009, 128-135.
https://doi.org/10.1109/IA.2009.4927510
[14]  Buneman, P. and Tan, W.-C. (2007) Provenance in Databases. Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, Beijing, June 2007, 1171-1173.
https://doi.org/10.1145/1247480.1247646
[15]  Papadimitriou, P. and Garcia-Molina, H. (2009) A Model for Data Leakage Detection. 2009 IEEE 25th International Conference on Data Engineering, Shanghai, 29 March-2 April 2009, 1307-1310.
https://doi.org/10.1109/ICDE.2009.227
[16]  Ajay Kumar, J. and Rajani Devi, K. (2012) An Efficient and Robust Model for Data. Leakage Detection System, 3, 91-95.
[17]  Kemerlis, V.P., Pappas, V., Portokalidis, G. and Keromytis, A.D. (2010) iLeak: A Lightweight System for Detecting Inadvertent Information Leaks. 2010 European Conference on Computer Network Defense, Berlin, 28-29 October 2010, 21-28.
https://doi.org/10.1109/EC2ND.2010.13
[18]  Hauer, B. (2015) Data and Information Leakage Prevention within the Scope of Information Security. IEEE Access, 3, 2554-2565.
https://doi.org/10.1109/ACCESS.2015.2506185
[19]  Srivatsa, M., Balfe, S., Paterson, K.G. and Rohatgi, P. (2008) Trust Management for Secure Information Flows. Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, October 2008, 175-188.
https://doi.org/10.1145/1455770.1455794
[20]  Fan, Y., Wang, Y., Wang, L. and Yu, R. (2010) A Trustworthiness-Based Distribution Model for Data Leakage Prevention. Wuhan University Journal of Natural sciences, 15, 205-209.
https://doi.org/10.1007/s11859-010-0305-7
[21]  Praveen, D.Y.S.S., Suba Rao, D. and Kumar, A. (2016) A Novel Model for Data Leakage Detection and Prevention in Distributed Environment. International Journal of Engineering and Technical Research, 4, 9.
[22]  Revathi, Y. ad Kumar, D.S.M. (2016) Review on Importance and Advancement in Detecting Sensitive Data Leakage in Public Network. International Journal of Engineering Research and General Science, 4, 263-265.
[23]  Hart, M., Manadhata, P. and Johnson, R. (2011) Text Classification for Data Loss Prevention. International Symposium on Privacy Enhancing Technologies Symposium, Waterloo, 27-29 July 2011, 18-37.
https://doi.org/10.1007/978-3-642-22263-4_2
[24]  Maldonado, C. (2015) Data Leakage Detection Using dynamic Data Structure and Classification Technique. INGE CUC, 11, 79-84.
[25]  Faiz, M.F., Arshad, J., Alazab, M. and Shalaginov, A. (2020) Predicting Likelihood of Legitimate Data Loss in Email DLP. Future Generation Computer Systems, 110, 744-757.
https://doi.org/10.1016/j.future.2019.11.004
[26]  Graef, I., Husovec, M. and Purtova, N. (2018) Data Portability and Data Control: Lessons for an Emerging Concept in EU Law. German Law Journal, 19, 1359-1398.
https://doi.org/10.1017/S2071832200023075

Full-Text

Contact Us

[email protected]

QQ:3279437679

WhatsApp +8615387084133