Enterprise data breach: causes, challenges, prevention, and future directions

L Cheng, F Liu, D Yao - Wiley Interdisciplinary Reviews: Data …, 2017 - Wiley Online Library
A data breach is the intentional or inadvertent exposure of confidential information to
unauthorized parties. In the digital era, data has become one of the most critical components …

Cloud computing security: a taxonomy, threat detection and mitigation techniques

P Rani, S Singh, K Singh - International Journal of Computers and …, 2024 - Taylor & Francis
Cloud Computing is a rapidly growing emerging technology in the IT environment. Internet-
based computing provides services like sharing resources eg network, storage, applications …

Privacy-preserving detection of sensitive data exposure

X Shu, D Yao, E Bertino - IEEE transactions on information …, 2015 - ieeexplore.ieee.org
Statistics from security firms, research institutions and government organizations show that
the number of data-leak instances have grown rapidly in recent years. Among various data …

A holistic view on data protection for sharing, communicating, and computing environments: Taxonomy and future directions

I Gupta, AK Singh - arxiv preprint arxiv:2202.11965, 2022 - arxiv.org
The data is an important asset of an organization and it is essential to keep this asset
secure. It requires security in whatever state is it ie data at rest, data in use, and data in …

Fast detection of transformed data leaks

X Shu, J Zhang, DD Yao, W Feng - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
The leak of sensitive data on computer systems poses a serious threat to organizational
security. Statistics show that the lack of proper encryption on files and communications due …

SELI: Statistical evaluation based leaker identification stochastic scheme for secure data sharing

I Gupta, AK Singh - IET Communications, 2020 - Wiley Online Library
Data leakage has become a critical challenge for any organisation, especially when the third
party is involved with legitimate permissions to access its confidential data. This study …

A probabilistic approach for guilty agent detection using bigraph after distribution of sample data

I Gupta, AK Singh - Procedia Computer Science, 2018 - Elsevier
In today's on-growing world, there is need to share the information within or outside the
enterprise which includes the sensitive information of the enterprise also. For example …

Firm diversity and data breach risk: a longitudinal study

Q Wang, EWT Ngai - The Journal of Strategic Information Systems, 2022 - Elsevier
Research has extensively investigated the rationale of firm diversity from the economic
perspective, but little is known about how such a strategy may affect information security …

GUIM‐SMD: guilty user identification model using summation matrix‐based distribution

I Gupta, AK Singh - IET Information Security, 2020 - Wiley Online Library
Data sharing across multiple different entities is on‐demand to upgrade an enterprise's
performance. However, some malicious entity can reveal this data to an unauthorised third …

Lightweight selective encryption for social data protection based on EBCOT coding

H Qiu, M Qiu, M Liu, Z Ming - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Online social media today has a large number of users and has become a huge platform to
collect and share the social data generated by the end users. In addition, based on the …