Data Lineage in Malicious Environment (DLIME) for Text Data by using AES, SHA

Abstract

Intentional or unintentional confidential data is leaked and it is undoubtedly one of the most severe security threats that organizations are facing in this digital era. The threats now extending to our personal lives and professional lives, information is available to social networks and smart phone providers is indirectly transferred(hacked or transferred) to untrustworthy third party and fourth party applications. Presenting a data lineage framework DLIME for identifying a guilt entity who leaked the data across public cloud which takes three characteristic, principal roles (i.e. owner, consumer and consumer). DLIME allows to identify guilty entity who leaked the data within a malicious environment by building upon fake record, digital signature and encrypting the modified record.

Authors and Affiliations

Prof. Abhijit Pawar, Miss. Sonali Kadam, Miss. Pranali Jagtap, Miss. Priyanka Bhosale, Miss. Supriya Kadam

Keywords

Related Articles

Cayley-Hamilton Theorem for Fuzzy Matrix

The classical Cayley-Hamilton theorem says that every square matrix satisfies its own characteristic equation. The Cayley-Hamilton theorem has been extended to rectangular matrices, block matrices, pairs of commuting ma...

Comparative Study of TDMA and CDMA Technology

Since the mid-1990s, the cellular industry has witnessed high growth. The rapid growth in cellular telephone subscribers has demonstrated that wireless communication is a developing and useful voice and data transport....

slugAnalysis and Comparison of Various L ossless Compression T echniques

Compression is very much needed in today’s network for efficient transmission and efficient storage of data. In this paper we review and discuss about the image compression, need of compression, its principles,...

A Hybrid Implementation of New Power Converter for Hybrid Wind Solar Energy Conversion System

Wind power involves converting wind energy into electricity by using wind turbines. A wind turbine is composed of 3 propellers-like blades called a rotor. The rotor is attached to a tall tower. The tower looks like a ve...

Review paper of enhance the efficiency of the network by enhancing the error recovery by using the backup path in MPLS network

When data is transmitted at high speed through a cabled network, from any noise over the network or channel interference is introduce which causes heavy data loss. When data is transferring through a topology like bus o...

Download PDF file
  • EP ID EP23696
  • DOI http://doi.org/10.22214/ijraset.2017.3234
  • Views 340
  • Downloads 6

How To Cite

Prof. Abhijit Pawar, Miss. Sonali Kadam, Miss. Pranali Jagtap, Miss. Priyanka Bhosale, Miss. Supriya Kadam (2017). Data Lineage in Malicious Environment (DLIME) for Text Data by using AES, SHA. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(3), -. https://europub.co.uk./articles/-A-23696