A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices
Early data leakage protection methods for smart mobile devices usually focus on confidential terms and their context, which truly prevent some kinds of data leakage events. However, with the high dimensionality and redundancy of text data, it is difficult to detect the documents which contain confid...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2018-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2018/5823439 |
id |
doaj-404bab340fa2491e9d50c2a1a98c5b8f |
---|---|
record_format |
Article |
spelling |
doaj-404bab340fa2491e9d50c2a1a98c5b8f2020-11-24T21:22:37ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772018-01-01201810.1155/2018/58234395823439A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile DevicesXiang Yu0Zhihong Tian1Jing Qiu2Feng Jiang3School of Electronics and Information Engineering, Taizhou University, Taizhou 318000, ChinaCyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, ChinaCyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, ChinaCollege of Science and Technology, Harbin Institute of Technology, Harbin 150001, ChinaEarly data leakage protection methods for smart mobile devices usually focus on confidential terms and their context, which truly prevent some kinds of data leakage events. However, with the high dimensionality and redundancy of text data, it is difficult to detect the documents which contain confidential contents accurately. Our approach updates cluster graph structure based on CBDLP (Data Leakage Protection Based on Context) model by computing the importance of confidential terms and the terms within the range of their context. By applying CBDLP with pruning procedure which has been validated, we further remove the redundancy terms and noise terms. Actually, not only can confidential terms be accurately detected but also the sophisticated rephrased confidential contents are detected during the experiments.http://dx.doi.org/10.1155/2018/5823439 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Xiang Yu Zhihong Tian Jing Qiu Feng Jiang |
spellingShingle |
Xiang Yu Zhihong Tian Jing Qiu Feng Jiang A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices Wireless Communications and Mobile Computing |
author_facet |
Xiang Yu Zhihong Tian Jing Qiu Feng Jiang |
author_sort |
Xiang Yu |
title |
A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices |
title_short |
A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices |
title_full |
A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices |
title_fullStr |
A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices |
title_full_unstemmed |
A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices |
title_sort |
data leakage prevention method based on the reduction of confidential and context terms for smart mobile devices |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8669 1530-8677 |
publishDate |
2018-01-01 |
description |
Early data leakage protection methods for smart mobile devices usually focus on confidential terms and their context, which truly prevent some kinds of data leakage events. However, with the high dimensionality and redundancy of text data, it is difficult to detect the documents which contain confidential contents accurately. Our approach updates cluster graph structure based on CBDLP (Data Leakage Protection Based on Context) model by computing the importance of confidential terms and the terms within the range of their context. By applying CBDLP with pruning procedure which has been validated, we further remove the redundancy terms and noise terms. Actually, not only can confidential terms be accurately detected but also the sophisticated rephrased confidential contents are detected during the experiments. |
url |
http://dx.doi.org/10.1155/2018/5823439 |
work_keys_str_mv |
AT xiangyu adataleakagepreventionmethodbasedonthereductionofconfidentialandcontexttermsforsmartmobiledevices AT zhihongtian adataleakagepreventionmethodbasedonthereductionofconfidentialandcontexttermsforsmartmobiledevices AT jingqiu adataleakagepreventionmethodbasedonthereductionofconfidentialandcontexttermsforsmartmobiledevices AT fengjiang adataleakagepreventionmethodbasedonthereductionofconfidentialandcontexttermsforsmartmobiledevices AT xiangyu dataleakagepreventionmethodbasedonthereductionofconfidentialandcontexttermsforsmartmobiledevices AT zhihongtian dataleakagepreventionmethodbasedonthereductionofconfidentialandcontexttermsforsmartmobiledevices AT jingqiu dataleakagepreventionmethodbasedonthereductionofconfidentialandcontexttermsforsmartmobiledevices AT fengjiang dataleakagepreventionmethodbasedonthereductionofconfidentialandcontexttermsforsmartmobiledevices |
_version_ |
1725995060419362816 |