This paper is published in Volume-5, Issue-5, 2019
Area
Computer Science Engineering
Author
Noorisaba Sheikh
Org/Univ
RKDF College of Engineering and Technology, Bhopal, Madhya Pradesh, India
Keywords
Information leak detection, Content inspection, Sampling, Alignment, Dynamic programming
Citations
IEEE
Noorisaba Sheikh. Hybrid secured data retrieval disruption tolerant network, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Noorisaba Sheikh (2019). Hybrid secured data retrieval disruption tolerant network. International Journal of Advance Research, Ideas and Innovations in Technology, 5(5) www.IJARIIT.com.
MLA
Noorisaba Sheikh. "Hybrid secured data retrieval disruption tolerant network." International Journal of Advance Research, Ideas and Innovations in Technology 5.5 (2019). www.IJARIIT.com.
Noorisaba Sheikh. Hybrid secured data retrieval disruption tolerant network, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Noorisaba Sheikh (2019). Hybrid secured data retrieval disruption tolerant network. International Journal of Advance Research, Ideas and Innovations in Technology, 5(5) www.IJARIIT.com.
MLA
Noorisaba Sheikh. "Hybrid secured data retrieval disruption tolerant network." International Journal of Advance Research, Ideas and Innovations in Technology 5.5 (2019). www.IJARIIT.com.
Abstract
The sensitive data information leak of on systems has a big threat to system data. Research show that the encryption on files and communications due to human errors is one of the leading causes of information loss. However, finding the exposure of sensitive data information is important due to data transformation in the content. Transformations result in highly unpredictable leak patterns. In this paper, the sequence alignment techniques for detecting data-leak patterns. This algorithm is designed for detecting long and inexact sensitive data patterns. The system has detection accuracy in recognizing data leaks. To demonstrate the high multithreading scalability of the data leak detection method required by a requirement of organization.