Data Leakage Detector Article Swipe
Milind C Ahire
,
Mr. Yash. P. Govardhane
,
Miss. Harshada. S. Shinde
,
Pari Patel
·
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.47392/irjaeh.2025.0149
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.47392/irjaeh.2025.0149
In today’s digital landscape, ensuring data security has become a primary concern as cyber threats continue to evolve. This paper presents a comprehensive approach for detecting and preventing data leakage through the implementation of a Chrome extension that continuously monitors online interactions, tracks potential leaks, and provides real-time alerts. A key feature of this system is the session timeout mechanism, which minimizes unauthorized access risks. Additionally, a One-Time Password (OTP) authentication method is introduced to enhance security. This work contributes towards improving user privacy and cybersecurity awareness, offering a proactive solution against data breaches.
Related Topics
Metadata
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.47392/irjaeh.2025.0149
- https://irjaeh.com/index.php/journal/article/download/640/583
- OA Status
- diamond
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4408986624
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4408986624Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.47392/irjaeh.2025.0149Digital Object Identifier
- Title
-
Data Leakage DetectorWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-03-28Full publication date if available
- Authors
-
Milind C Ahire, Mr. Yash. P. Govardhane, Miss. Harshada. S. Shinde, Pari PatelList of authors in order
- Landing page
-
https://doi.org/10.47392/irjaeh.2025.0149Publisher landing page
- PDF URL
-
https://irjaeh.com/index.php/journal/article/download/640/583Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://irjaeh.com/index.php/journal/article/download/640/583Direct OA link when available
- Concepts
-
Leakage (economics), Computer science, Materials science, Economics, MacroeconomicsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4408986624 |
|---|---|
| doi | https://doi.org/10.47392/irjaeh.2025.0149 |
| ids.doi | https://doi.org/10.47392/irjaeh.2025.0149 |
| ids.openalex | https://openalex.org/W4408986624 |
| fwci | 0.0 |
| type | article |
| title | Data Leakage Detector |
| biblio.issue | 03 |
| biblio.volume | 3 |
| biblio.last_page | 1049 |
| biblio.first_page | 1047 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9236000180244446 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C2777042071 |
| concepts[0].level | 2 |
| concepts[0].score | 0.5788013935089111 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q6509304 |
| concepts[0].display_name | Leakage (economics) |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.402316689491272 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C192562407 |
| concepts[2].level | 0 |
| concepts[2].score | 0.33147576451301575 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q228736 |
| concepts[2].display_name | Materials science |
| concepts[3].id | https://openalex.org/C162324750 |
| concepts[3].level | 0 |
| concepts[3].score | 0.1024913489818573 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q8134 |
| concepts[3].display_name | Economics |
| concepts[4].id | https://openalex.org/C139719470 |
| concepts[4].level | 1 |
| concepts[4].score | 0.0 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q39680 |
| concepts[4].display_name | Macroeconomics |
| keywords[0].id | https://openalex.org/keywords/leakage |
| keywords[0].score | 0.5788013935089111 |
| keywords[0].display_name | Leakage (economics) |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.402316689491272 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/materials-science |
| keywords[2].score | 0.33147576451301575 |
| keywords[2].display_name | Materials science |
| keywords[3].id | https://openalex.org/keywords/economics |
| keywords[3].score | 0.1024913489818573 |
| keywords[3].display_name | Economics |
| language | en |
| locations[0].id | doi:10.47392/irjaeh.2025.0149 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S5407010578 |
| locations[0].source.issn | 2584-2137 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2584-2137 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | International Research Journal on Advanced Engineering Hub (IRJAEH) |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | |
| locations[0].pdf_url | https://irjaeh.com/index.php/journal/article/download/640/583 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Research Journal on Advanced Engineering Hub (IRJAEH) |
| locations[0].landing_page_url | https://doi.org/10.47392/irjaeh.2025.0149 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5076567207 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-8116-344X |
| authorships[0].author.display_name | Milind C Ahire |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | None Mr. Vaibhav. M. Ahire |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5116851160 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Mr. Yash. P. Govardhane |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | None Mr. Yash. P. Govardhane |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5116851161 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Miss. Harshada. S. Shinde |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | None Miss. Harshada. S. Shinde |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5084619676 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Pari Patel |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | None Prof. Farhat. A. Patel |
| authorships[3].is_corresponding | False |
| has_content.pdf | True |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://irjaeh.com/index.php/journal/article/download/640/583 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Data Leakage Detector |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9236000180244446 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W4404995717, https://openalex.org/W2016187641, https://openalex.org/W4404725684, https://openalex.org/W4246450666, https://openalex.org/W4388998267, https://openalex.org/W2898370298, https://openalex.org/W2137437058 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.47392/irjaeh.2025.0149 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S5407010578 |
| best_oa_location.source.issn | 2584-2137 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2584-2137 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | International Research Journal on Advanced Engineering Hub (IRJAEH) |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://irjaeh.com/index.php/journal/article/download/640/583 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Research Journal on Advanced Engineering Hub (IRJAEH) |
| best_oa_location.landing_page_url | https://doi.org/10.47392/irjaeh.2025.0149 |
| primary_location.id | doi:10.47392/irjaeh.2025.0149 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S5407010578 |
| primary_location.source.issn | 2584-2137 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2584-2137 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | International Research Journal on Advanced Engineering Hub (IRJAEH) |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | |
| primary_location.pdf_url | https://irjaeh.com/index.php/journal/article/download/640/583 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Research Journal on Advanced Engineering Hub (IRJAEH) |
| primary_location.landing_page_url | https://doi.org/10.47392/irjaeh.2025.0149 |
| publication_date | 2025-03-28 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.A | 49 |
| abstract_inverted_index.a | 9, 21, 34, 66, 88 |
| abstract_inverted_index.In | 0 |
| abstract_inverted_index.as | 12 |
| abstract_inverted_index.is | 55, 72 |
| abstract_inverted_index.of | 33, 52 |
| abstract_inverted_index.to | 16, 74 |
| abstract_inverted_index.and | 26, 45, 84 |
| abstract_inverted_index.for | 24 |
| abstract_inverted_index.has | 7 |
| abstract_inverted_index.key | 50 |
| abstract_inverted_index.the | 31, 56 |
| abstract_inverted_index.This | 18, 77 |
| abstract_inverted_index.data | 5, 28, 92 |
| abstract_inverted_index.that | 37 |
| abstract_inverted_index.this | 53 |
| abstract_inverted_index.user | 82 |
| abstract_inverted_index.work | 78 |
| abstract_inverted_index.(OTP) | 69 |
| abstract_inverted_index.cyber | 13 |
| abstract_inverted_index.paper | 19 |
| abstract_inverted_index.which | 60 |
| abstract_inverted_index.Chrome | 35 |
| abstract_inverted_index.access | 63 |
| abstract_inverted_index.become | 8 |
| abstract_inverted_index.leaks, | 44 |
| abstract_inverted_index.method | 71 |
| abstract_inverted_index.online | 40 |
| abstract_inverted_index.risks. | 64 |
| abstract_inverted_index.system | 54 |
| abstract_inverted_index.tracks | 42 |
| abstract_inverted_index.against | 91 |
| abstract_inverted_index.alerts. | 48 |
| abstract_inverted_index.concern | 11 |
| abstract_inverted_index.digital | 2 |
| abstract_inverted_index.enhance | 75 |
| abstract_inverted_index.evolve. | 17 |
| abstract_inverted_index.feature | 51 |
| abstract_inverted_index.leakage | 29 |
| abstract_inverted_index.primary | 10 |
| abstract_inverted_index.privacy | 83 |
| abstract_inverted_index.session | 57 |
| abstract_inverted_index.threats | 14 |
| abstract_inverted_index.through | 30 |
| abstract_inverted_index.timeout | 58 |
| abstract_inverted_index.towards | 80 |
| abstract_inverted_index.One-Time | 67 |
| abstract_inverted_index.Password | 68 |
| abstract_inverted_index.approach | 23 |
| abstract_inverted_index.continue | 15 |
| abstract_inverted_index.ensuring | 4 |
| abstract_inverted_index.monitors | 39 |
| abstract_inverted_index.offering | 87 |
| abstract_inverted_index.presents | 20 |
| abstract_inverted_index.provides | 46 |
| abstract_inverted_index.security | 6 |
| abstract_inverted_index.solution | 90 |
| abstract_inverted_index.breaches. | 93 |
| abstract_inverted_index.detecting | 25 |
| abstract_inverted_index.extension | 36 |
| abstract_inverted_index.improving | 81 |
| abstract_inverted_index.minimizes | 61 |
| abstract_inverted_index.potential | 43 |
| abstract_inverted_index.proactive | 89 |
| abstract_inverted_index.real-time | 47 |
| abstract_inverted_index.security. | 76 |
| abstract_inverted_index.today’s | 1 |
| abstract_inverted_index.awareness, | 86 |
| abstract_inverted_index.introduced | 73 |
| abstract_inverted_index.landscape, | 3 |
| abstract_inverted_index.mechanism, | 59 |
| abstract_inverted_index.preventing | 27 |
| abstract_inverted_index.contributes | 79 |
| abstract_inverted_index.continuously | 38 |
| abstract_inverted_index.unauthorized | 62 |
| abstract_inverted_index.Additionally, | 65 |
| abstract_inverted_index.comprehensive | 22 |
| abstract_inverted_index.cybersecurity | 85 |
| abstract_inverted_index.interactions, | 41 |
| abstract_inverted_index.authentication | 70 |
| abstract_inverted_index.implementation | 32 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile.value | 0.10093704 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |