Data Flow for Effective Data Leakage Prevention using Elliptic Curve Digital Signature Algorithm

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 7, Issue 3

Abstract

Sensitive data is leaked in software firm, government sectors and also from the web. To prevent this leakage, data allocation strategies are used. Data allocation Strategy improves the probability of identifying leakages. The current model in leakage detection is handled by watermarking. Watermarks can be useful in some of the cases, but it again, modifies of the original data. If the recipient is malicious watermarks can be destroyed. After giving a set of data to agents, the distributor saw some of the same data in an unauthorized place. At this point the distributor came to know that the data is leaked and came from one or more agents. If the distributor got the enough evidence that an agent leaked data, he may initiate legal proceedings. The data allocation techniques are used to identify the leaking agent. The “guilt model” is used to find the probability of leaking agent. The ECDSA algorithm is used to prevent the data from untrusted party. The Algorithm used is Sample data request and explicit data request. By implementing guilt model and ECDSA techniques the distributor can identify the leaking agents and to whom the data leaks.

Authors and Affiliations

Tony Thomas , V. Balajishanmuga

Keywords

Related Articles

Computer Aided Detection Algorithm for Digital Mammogram Images – A Survey

In worldwide, Breast cancer is one of the leading disease among the women, under the age group of 15- 54. An automatic detection of micro calcifications is performed in magnetic resonance imaging system. Here discuss abo...

A survey on Human Computer Interaction Mechanism Using Finger Tracking

Human Computer Interaction (HCI) is a field in which developer makes a user friendly system. User can interact with a computer system without using any conventional peripheral devices. Marker is used to recognize hand mo...

Improving Service Credibility Using Password Authenticated Peer Services

Password-Authenticated Key Exchange (PAKE) is where a client and a server, who share a password, authenticate each other and meanwhile establish a cryptographic key by exchange of messages. In a scenario where two server...

VHDL Modeling of Intrusion Detection & Prevention System (IDPS) – A Neural Network Approach

The rapid development and expansion of World Wide Web and network systems have changed the computing world in the last decade and also equipped the intruders and hackers with new facilities for their destructive purposes...

Information Security and Risk Management for Banking System

Risk management provides an effective approach for measuring the security, but existing risk management approaches come with major shortcomings such as the demand for a very detailed knowledge about the IT security spher...

Download PDF file
  • EP ID EP88485
  • DOI -
  • Views 173
  • Downloads 0

How To Cite

Tony Thomas, V. Balajishanmuga (2014). Data Flow for Effective Data Leakage Prevention using Elliptic Curve Digital Signature Algorithm. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 7(3), 160-162. https://europub.co.uk/articles/-A-88485