A Review and Analysis of Privacy Preserving Detection Techniques of Sensitive Data Exposure