Prevention and Data Leakage Detection using Trace Log
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 7
Abstract
In the world of modern computer era, need for handling sensitive data to third party agents has become inevitable. Data loss and its prevention has become a vital problem that needs to be solved in many organizations. There are lots of possible identified routes to increase security and data loss which resulted to increase complexity. Therefore, agents need to provide confidentiality for users, maintain integrity and assure availability of all data. In general Data Leakage Prevention is done by transforming highly sensitive data to least sensitive or encrypting using cryptic algorithm or watermarking an image. Probable solution for the Data Leakage Prevention is by encrypting Data and Fake Records using Secure Hash Algorithm (SHA) and Detection by using Explicit Data allocation strategies (across the agents), which are used to identify the leakages. To further increase the chance of detecting the agent Trace log file is created. The Solution is achieved by sending the same data over many agents and restricting the Distributor to collect data only through agent.
Authors and Affiliations
Parvathi Maheswari T
TRACER STUDY OF BACHELOR OF SCIENCE IN MARINE TRANSPORTATION MAJOR IN NAUTICAL STUDIES GRADUATES OF THE NAVAL STATE UNIVERSITY
This study sought to find out the profile of graduates of the BSMT-Nautical Studies of the Naval State University, Naval, Biliran. Results revealed that the age of the respondents ranged from 21 to 39 years ol...
Critical Event Monitoring in WSNS using Level-By-Level Offset Based Wake up Pattern
This paper proposed to monitor a critical event in wireless sensor networks. Whenever a critical event occurs, the critical event is detected by the nearby sensor nodes. Immediately these sensor nodes should broad...
Wave Energy Collector: Theoretical Model
Offshore wave energy has the potential to be one of the most environmentally gentle forms of electricity generation with a least visual impact from the shore. Currentl wind-resources of about 72 TW and the ocean deman...
AN ENERGY EFFICIENT PROTOCOL BASED ON HIERARCHICAL ROUTING TECHNIQUE FOR WSN
The area of wireless sensor networks (WSNs) is one of the emerging and fast growing fields in the scientific world. This has brought about developing low cost, low-power and multi-function sensor nodes. However, t...
Nodes Self-Scheduling Approach for Maximising Wireless Sensor Network Lifetime
Coverage and energy conservation are two major issues in wireless sensor networks (WSNs), especially when sensors are randomly deployed in large areas. In such WSNs, sensors are equipped with limited lifetime bat...