Font Size: a A A

Research On Key Technology Of Data Leakage Protection

Posted on:2019-03-05Degree:MasterType:Thesis
Country:ChinaCandidate:X FanFull Text:PDF
GTID:2428330590465715Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
As the big data era has come into being,the value of data is enormous.Data leakage has become an increasingly serious problem in recent years.Although a large number of techniques have been developed for the data security by using different encryption algorithms,a major issue of the data leakage caused by internal staff of enterprises still remains.Data security is difficult for most companies.Data leakage tracking is the biggest challenge for enterprises.Many technologies such as encryption,firewalls,access control,identity management,watermark based detectors and others have already been incorporated to offer protection against various facets of the data leakage threat.This thesis aims to study key technologies for data leakage protection and proposes a solution including data leakage prevention,detection,and tracking technologies.Data leakage prevention mainly includes data encryption technology and digital watermarking technology.In order to solve the problem which is caused by photos or screen shots,a method to generate adaptive screen watermark is proposed.It can protect data and find the leakers.It will generate adaptive watermark on the text area and will not affect the screen content.The method can record the user name and find the source of leakage as soon as possible.Besides it can prevent the expansion of leakage.It mainly includes four steps.Firstly,printing screen and clipping the screenshot.Secondly,decolorization and filtering.Then make a marginal processing.Finally,connect all text areas into a whole region where watermark generates.Data leak detection mainly includes the detection of digital watermarks and the detection of matches such as keywords.Data leak tracking technology includes fog computing trap technology and application allocation strategy.Due to the current status of massive information being owned by massive agents,the new agent guilty model is currently used to assess the probability of leaks by agents,so as to achieve data leak detection and tracking.This improves a new method which puts forward a weighted evaluation scheme that assigns different weights according to the distribution of data.Experiments have shown that the weighted model assessment results improved dramatically over the accuracy of the probability assessment model.This research indicates that the prevention,detection and tracking are key technologies for data leakage protection.They have a significance in data leakage protection.
Keywords/Search Tags:data leakage, prevention, detection, tracking, digital watermarking
PDF Full Text Request
Related items