Data Lineage in Malicious Environment (DLIME) for Text Data by using AES, SHA
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 3
Abstract
Intentional or unintentional confidential data is leaked and it is undoubtedly one of the most severe security threats that organizations are facing in this digital era. The threats now extending to our personal lives and professional lives, information is available to social networks and smart phone providers is indirectly transferred(hacked or transferred) to untrustworthy third party and fourth party applications. Presenting a data lineage framework DLIME for identifying a guilt entity who leaked the data across public cloud which takes three characteristic, principal roles (i.e. owner, consumer and consumer). DLIME allows to identify guilty entity who leaked the data within a malicious environment by building upon fake record, digital signature and encrypting the modified record.
Authors and Affiliations
Prof. Abhijit Pawar, Miss. Sonali Kadam, Miss. Pranali Jagtap, Miss. Priyanka Bhosale, Miss. Supriya Kadam
Prevention of Geometric Attacks Using Image Watermarking Technique
In this paper, a robust image watermarking algorithm which was based on singular value decomposition (SVD) and discrete wavelet transform (DWT) was proposed and simulated for protecting real property rights. To obtain t...
Comparative Analysis of Hybrid DKT-DCT with DKT and DCT in Image Compression
Image compression is one of the prominent applications of image processing. It has triggered the need of data compression so that volume of data and bandwidth required to transmit it can be reduced. Still image compress...
Network programming in Java using Socket
This paper describes about Network programming using java. The Network programming is similar to socket programming or Client-Server programming. Where Socket programming is important to understand how internet based i...
Role of VANET in Smart City
Road safety has become a main issue for governments and car manufacturers in the last twenty years. The development of new vehicular technologies has favorite companies, researchers and institutions to focus their effor...
Internet of Things based Hazardous Gas detection in Power Plants
As most of the power production in today’s world mainly relies on power plants,it becomes more considerate for its safety. It is necessary that good safety systems are to be implemented in places of education and work....