ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Auditor Implementation in Malicious Environments for Detecting Guilty Party for Data Leakage and Provide Security for Data Transfer

Journal: IPASJ International Journal of Computer Science (IIJCS) (Vol.5, No. 9)

Publication Date:

Authors : ;

Page : 46-49

Keywords : ;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

ABSTRACT The authorized or unauthorized leakage of secret information isnt any doubt one of the maximum principal safety issues which businesses or structures face in this era. It also impacts our private each day life: The personal facts is available on social networks, or now-a-days its also available on Smartphone is intentionally or by accident transferred to third party or hackers. Also a records distributor may provide private information to a few relied on marketers or third parties. During this technique some records is leaked or transferred to unauthorized region. We advocate facts allocation strategies to be able to supply extra probability of identifying leakages. We present a LIME data lineage framework for information float throughout diverse places. By the use of oblivious transfer, robust watermarking, and signature primitives we develop as well as examine the data switch protocol in malicious environments among two entities. Keywords: data leakage, malicious environment, LIME framework, watermarking, data lineage method

Last modified: 2017-10-12 16:44:02