Data Lineage in Malicious Environment (DLIME) for Text Data by using AES, SHA

Abstract

Intentional or unintentional confidential data is leaked and it is undoubtedly one of the most severe security threats that organizations are facing in this digital era. The threats now extending to our personal lives and professional lives, information is available to social networks and smart phone providers is indirectly transferred(hacked or transferred) to untrustworthy third party and fourth party applications. Presenting a data lineage framework DLIME for identifying a guilt entity who leaked the data across public cloud which takes three characteristic, principal roles (i.e. owner, consumer and consumer). DLIME allows to identify guilty entity who leaked the data within a malicious environment by building upon fake record, digital signature and encrypting the modified record.

Authors and Affiliations

Prof. Abhijit Pawar, Miss. Sonali Kadam, Miss. Pranali Jagtap, Miss. Priyanka Bhosale, Miss. Supriya Kadam

Keywords

Related Articles

Cust-Flex Mac and Sale-Ware based on Three-Tier Architecture

In this cust-flex mac and sale-ware (customer flexible manufacturing activity control and sales software) makes industrial companies to change radically, becoming more flexible, customer oriented and agile in manufactur...

A Review On Performance Of Heat Exchangers With Different Configurations

The requirement of the current manufacturing and production industries directs the researchers in finding an alternative system which should be effective in the most efficient way. This enables us to concentrate on the...

Opportunistic Transmission Scheduling Using Medium Access Control Protocol

Mobile underwater networks with acoustic communications are confronted with several unique challenges such as long propagation delay, high transmission power utilization, and node mobility. Propose the delay-aware oppor...

Design and Analysis of Corrugated Aluminum Sandwich Structures Using Ansys Workbench

Sandwich plates are composed of face plates which are separated by core material. They are usually designed in such a way that the face plates carry the bending and in-plane loads. The core is designed to carry longitud...

slugPerformance Improvement of Ad-Hoc Networks Using Multi-Interface Multi-Channel Mac and Routing Protocols

IEEE 802.11 MAC standard allocates single channel, single interface to each node in the case of wireless ad-hoc networks, as a default behavior of this protocol. The same feature of single channel, single interface per...

Download PDF file
  • EP ID EP23696
  • DOI http://doi.org/10.22214/ijraset.2017.3234
  • Views 332
  • Downloads 6

How To Cite

Prof. Abhijit Pawar, Miss. Sonali Kadam, Miss. Pranali Jagtap, Miss. Priyanka Bhosale, Miss. Supriya Kadam (2017). Data Lineage in Malicious Environment (DLIME) for Text Data by using AES, SHA. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(3), -. https://europub.co.uk./articles/-A-23696