Data Lineage in Malicious Environment (DLIME) for Text Data by using AES, SHA
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 3
Abstract
Intentional or unintentional confidential data is leaked and it is undoubtedly one of the most severe security threats that organizations are facing in this digital era. The threats now extending to our personal lives and professional lives, information is available to social networks and smart phone providers is indirectly transferred(hacked or transferred) to untrustworthy third party and fourth party applications. Presenting a data lineage framework DLIME for identifying a guilt entity who leaked the data across public cloud which takes three characteristic, principal roles (i.e. owner, consumer and consumer). DLIME allows to identify guilty entity who leaked the data within a malicious environment by building upon fake record, digital signature and encrypting the modified record.
Authors and Affiliations
Prof. Abhijit Pawar, Miss. Sonali Kadam, Miss. Pranali Jagtap, Miss. Priyanka Bhosale, Miss. Supriya Kadam
Cayley-Hamilton Theorem for Fuzzy Matrix
The classical Cayley-Hamilton theorem says that every square matrix satisfies its own characteristic equation. The Cayley-Hamilton theorem has been extended to rectangular matrices, block matrices, pairs of commuting ma...
Comparative Study of TDMA and CDMA Technology
Since the mid-1990s, the cellular industry has witnessed high growth. The rapid growth in cellular telephone subscribers has demonstrated that wireless communication is a developing and useful voice and data transport....
slugAnalysis and Comparison of Various L ossless Compression T echniques
Compression is very much needed in today’s network for efficient transmission and efficient storage of data. In this paper we review and discuss about the image compression, need of compression, its principles,...
A Hybrid Implementation of New Power Converter for Hybrid Wind Solar Energy Conversion System
Wind power involves converting wind energy into electricity by using wind turbines. A wind turbine is composed of 3 propellers-like blades called a rotor. The rotor is attached to a tall tower. The tower looks like a ve...
Review paper of enhance the efficiency of the network by enhancing the error recovery by using the backup path in MPLS network
When data is transmitted at high speed through a cabled network, from any noise over the network or channel interference is introduce which causes heavy data loss. When data is transferring through a topology like bus o...