Data Extraction in Malignant Environments

Authors

  • Amith Manda  M. Tech Scholar, Department of CSE, Malla Reddy Engineering College (A), Telangana, India
  • Dr. R. P. Ramkumar  Professor, Department of CSE, Malla Reddy Engineering College (A) Telangana, India

DOI:

https://doi.org//10.32628/CSEIT195116

Keywords:

Classified Data, LIME, Trademark, Malicious Environment, Micro Benchmarking, Pairing Based Cryptography, GNU

Abstract

Deliberate or inadvertent escape of classified data is undoubtedly one among the premier extreme security dangers that associations look inside the advanced period. The risk right now stretches out to the private lives: an abundance of private information is out there to interpersonal organizations and great telephone providers and is in a roundabout way exchanged to undependable outsider and fourth gathering applications. amid this work, a bland data genealogy structure LIME(Data Lineage in the Malicious Environment), is utilized for data stream over different elements that take two trademark, guideline parts (i.e., proprietor and buyer). It characterizes the exact security ensures required by such a data heredity component toward recognizable proof of a blameworthy substance, and decide the disentangling non-denial and trustworthiness suspicions. At that point create and break down a totally special dependable data exchange convention between two substances among noxious surroundings by expanding upon unmindful exchange, solid watermarking, and mark natives. At long last, an exploratory investigation to exhibit the helpfulness of convention what's more, apply structure to the important data run projections of learning outsourcing and the informal organizations. In general, LIME(Data Lineage in the Malicious Environment),lineage structure for information exchange, to be a key advance towards accomplishing responsibility by plan.

References

  1. Chronology of data breaches," http://www.pri"acyrights.org/data-breach.
  2. "Data breach cost," http://www.symantec.com/about/news/release/article.jsp?prid=2011030801
  3. "Pri"acy rights clearinghouse," http://www.pri"acyrights.org.
  4. "Electronic Pri"acy Information Center (EPIC)," http://epic.org, 1994.
  5. "Facebook in Pri"acy Breach," http://online.wsj.com/article/SB10001424052702304772804575558484075236968.html.
  6. "Offshore outsourcing," http://www.computerworld.com/s/article/109938/Offshore outsourcing cited in Florida data leak.
  7. A. Mascher-Kampfer, H. Stogner, and A. Uhl, "Multiple re-watermarking scenarios," in Proceedings of the 13th International Conference on Systems, Signals, and Image Processing (IWSSIP 2006). Citeseer, 2006, pp. 53-56.
  8. P. Papadimitriou and H. Garcia-Molina, "Data leakage detection," Knowledge and Data Engineering, IEEE Transactions on, "ol. 23, no. 1, pp. 51-63, 2011.
  9. "Pairing-Based Cryptography Library (PBC)," http://crypto.stanford.edu/pbc.
  10. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," Image Processing, IEEE Transactions on, "ol. 6, no. 12, pp. 1673-1687, 1997.
  11. B. Pfitzmann and M. Waidner, "Asymmetric fingerprinting for larger collusions," in Proceedings of the 4th ACM conference on Computer and communications security, ser. CCS ’97, 1997, pp. 151-160.
  12. S. Goldwasser, S. Micali, and R. L. Ri"est, "A digital signature scheme secure against adapti"e chosen-message attacks," SIAM J. Comput., "ol. 17, no. 2, pp. 281-308, 1988.
  13. A. Adelsbach, S. Katzenbeisser, and A.-R. Sadeghi, "A computational model for watermark robustness," in Information Hiding. Springer, 2007, pp. 145-160.
  14. J. Kilian, F. T. Leighton, L. R. Matheson, T. G. Shamoon, R. E. Tarjan, and F. Zane, "Resistance of digital watermarks to collusi"e attacks," in IEEE International Symposium on Information Theory, 1998, pp. 271-271.
  15. M. Naor and B. Pinkas, "Efficient obli"ious transfer protocols," in Proceedings of the Twelfth Annual ACM-SIAM Symposium on Discrete Algorithms, 2001, pp. 448-457

Downloads

Published

2019-01-30

Issue

Section

Research Articles

How to Cite

[1]
Amith Manda, Dr. R. P. Ramkumar, " Data Extraction in Malignant Environments, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 1, pp.123-130, January-February-2019. Available at doi : https://doi.org/10.32628/CSEIT195116