Auditor Implementation in Malicious Environments for Detecting Guilty Party for Data Leakage and Provide Security for Data Transfer
Journal: IPASJ International Journal of Computer Science (IIJCS) (Vol.5, No. 9)Publication Date: 2017-10-09
Authors : Rawali P D. Baswaraj;
Page : 46-49
Keywords : ;
Abstract
ABSTRACT The authorized or unauthorized leakage of secret information isnt any doubt one of the maximum principal safety issues which businesses or structures face in this era. It also impacts our private each day life: The personal facts is available on social networks, or now-a-days its also available on Smartphone is intentionally or by accident transferred to third party or hackers. Also a records distributor may provide private information to a few relied on marketers or third parties. During this technique some records is leaked or transferred to unauthorized region. We advocate facts allocation strategies to be able to supply extra probability of identifying leakages. We present a LIME data lineage framework for information float throughout diverse places. By the use of oblivious transfer, robust watermarking, and signature primitives we develop as well as examine the data switch protocol in malicious environments among two entities. Keywords: data leakage, malicious environment, LIME framework, watermarking, data lineage method
Other Latest Articles
- Prediction based Auto Scaling for Cloud Applications
- A STUDY ON DIABETES HEALTHCARE PATHWAY PROCESS USING DATA MINING TECHNIQUES
- Blacklist Technique for Detection and Isolation of Malicious nodes from Manet
- A INNOVATIVE APPROACH FOR CONTENT BASED IMAGE RETRIEVAL USING CLOUD COMPUTING
- Consumer Attitude towards purchase of Real Estate
Last modified: 2017-10-12 16:44:02