Data Lineage in Malicious Environment (DLIME) for Text Data by using AES, SHA

Abstract

Intentional or unintentional confidential data is leaked and it is undoubtedly one of the most severe security threats that organizations are facing in this digital era. The threats now extending to our personal lives and professional lives, information is available to social networks and smart phone providers is indirectly transferred(hacked or transferred) to untrustworthy third party and fourth party applications. Presenting a data lineage framework DLIME for identifying a guilt entity who leaked the data across public cloud which takes three characteristic, principal roles (i.e. owner, consumer and consumer). DLIME allows to identify guilty entity who leaked the data within a malicious environment by building upon fake record, digital signature and encrypting the modified record.

Authors and Affiliations

Prof. Abhijit Pawar, Miss. Sonali Kadam, Miss. Pranali Jagtap, Miss. Priyanka Bhosale, Miss. Supriya Kadam

Keywords

Related Articles

Prevention of Geometric Attacks Using Image Watermarking Technique

In this paper, a robust image watermarking algorithm which was based on singular value decomposition (SVD) and discrete wavelet transform (DWT) was proposed and simulated for protecting real property rights. To obtain t...

Comparative Analysis of Hybrid DKT-DCT with DKT and DCT in Image Compression

Image compression is one of the prominent applications of image processing. It has triggered the need of data compression so that volume of data and bandwidth required to transmit it can be reduced. Still image compress...

Network programming in Java using Socket

This paper describes about Network programming using java. The Network programming is similar to socket programming or Client-Server programming. Where Socket programming is important to understand how internet based i...

Role of VANET in Smart City

Road safety has become a main issue for governments and car manufacturers in the last twenty years. The development of new vehicular technologies has favorite companies, researchers and institutions to focus their effor...

Internet of Things based Hazardous Gas detection in Power Plants

As most of the power production in today’s world mainly relies on power plants,it becomes more considerate for its safety. It is necessary that good safety systems are to be implemented in places of education and work....

Download PDF file
  • EP ID EP23696
  • DOI http://doi.org/10.22214/ijraset.2017.3234
  • Views 326
  • Downloads 6

How To Cite

Prof. Abhijit Pawar, Miss. Sonali Kadam, Miss. Pranali Jagtap, Miss. Priyanka Bhosale, Miss. Supriya Kadam (2017). Data Lineage in Malicious Environment (DLIME) for Text Data by using AES, SHA. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(3), -. https://europub.co.uk/articles/-A-23696