Data Flow for Effective Data Leakage Prevention using Elliptic Curve Digital Signature Algorithm
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 7, Issue 3
Abstract
Sensitive data is leaked in software firm, government sectors and also from the web. To prevent this leakage, data allocation strategies are used. Data allocation Strategy improves the probability of identifying leakages. The current model in leakage detection is handled by watermarking. Watermarks can be useful in some of the cases, but it again, modifies of the original data. If the recipient is malicious watermarks can be destroyed. After giving a set of data to agents, the distributor saw some of the same data in an unauthorized place. At this point the distributor came to know that the data is leaked and came from one or more agents. If the distributor got the enough evidence that an agent leaked data, he may initiate legal proceedings. The data allocation techniques are used to identify the leaking agent. The “guilt model” is used to find the probability of leaking agent. The ECDSA algorithm is used to prevent the data from untrusted party. The Algorithm used is Sample data request and explicit data request. By implementing guilt model and ECDSA techniques the distributor can identify the leaking agents and to whom the data leaks.
Authors and Affiliations
Tony Thomas , V. Balajishanmuga
A Review of Cyber Attack Classification Technique Based on Data Mining and Neural Network Approach
Cyber attack detection and classification is major challenge for web and network security. The increasing data traffic in network and web invites multiple cyber attack. The dynamic nature and large number of attribute of...
Statistical Anomaly Detection Technique for Real Time Datasets
Data mining is the technique of discovering patterns among data to analyze patterns or decision making predictions. Anomaly detection is the technique of identifying occurrences that deviate immensely from the large a...
Updating the Routing Position in Adhoc Networks by using Adaptive Position
In geographic routing, nodes to theirinstantaneous neighbors call for to maintain up-to-date positions for making successfulforwarding decisions. The geographic location coordinates of the nodes by the periodic broadcast...
Web Content Classification: A Survey
As the information contained within the web is increasing day by day, organizing this information could be a necessary requirement.The data mining process is to extract information from a data set and transform it into a...
Categorical Heuristic for Attribute Based Encryption in the Cloud Server
Attribute-based encryption (ABE) is a public-key based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted...