Manuscript Number : CSEIT172460
A Computational System in Sequence of Information Ruptures
Authors(2) :-MD Nazimuddin Ahmed, Md Ateeq Ur Rahman This paper contains the achievement of information lineage in malevolent situations. Data breach of individuals is a serious issue considering the information confidentiality and reliability of the data provider. The data provider should properly scrutinize the situation of data infringement and analyze possible solutions for blocking such trespassers. Here we intend to present a system that specifically eliminates all such fissures during allocation of data. The designed methods primarily concentrate upon narrowing down the breach of data instead of only providing alternate data or faked data. Data sent over any network is prone and exposed to different network data breaches. So, diligent security must be implemented with the information sent over the transferred network. With rapid increase in communication means, our smart phones and social networks have a lot of private and confidential information, and all these may be leaked without security. To counter this, data descent mechanism is used or in general the concept of data descent in malevolent conditions is deployed. This generally initiates with improper information fed to suspected requester. The system is developed in a critical environment prone to attack wherein we can transfer our data with different information coupled with different cryptographic techniques. Furthermore, experimental analysis of our design and proper implementation is done in vivid situations of within and outside transfer of organizational data. So, we define the aspects of data breach in various possible situations in general and well-defined implementation of our system in particular to analyze and provide a secure means of data descent.
MD Nazimuddin Ahmed Information Breach, Data Descent, Responsibility, System Design And Analysis, Fingerprinting, Oblivious Transfer, Watermarking, Encipherment. Publication Details Published in : Volume 2 | Issue 4 | July-August 2017 Article Preview
M.Tech Scholar, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Hyderabad, Telangana, India
Md Ateeq Ur Rahman
Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Hyderabad, Telangana, India
Date of Publication : 2017-08-31
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 321-327
Manuscript Number : CSEIT172460
Publisher : Technoscience Academy