Data Extraction in Malignant Environments

Authors(2) :-Amith Manda, Dr. R. P. Ramkumar

Deliberate or inadvertent escape of classified data is undoubtedly one among the premier extreme security dangers that associations look inside the advanced period. The risk right now stretches out to the private lives: an abundance of private information is out there to interpersonal organizations and great telephone providers and is in a roundabout way exchanged to undependable outsider and fourth gathering applications. amid this work, a bland data genealogy structure LIME(Data Lineage in the Malicious Environment), is utilized for data stream over different elements that take two trademark, guideline parts (i.e., proprietor and buyer). It characterizes the exact security ensures required by such a data heredity component toward recognizable proof of a blameworthy substance, and decide the disentangling non-denial and trustworthiness suspicions. At that point create and break down a totally special dependable data exchange convention between two substances among noxious surroundings by expanding upon unmindful exchange, solid watermarking, and mark natives. At long last, an exploratory investigation to exhibit the helpfulness of convention what's more, apply structure to the important data run projections of learning outsourcing and the informal organizations. In general, LIME(Data Lineage in the Malicious Environment),lineage structure for information exchange, to be a key advance towards accomplishing responsibility by plan.

Authors and Affiliations

Amith Manda
M. Tech Scholar, Department of CSE, Malla Reddy Engineering College (A), Telangana, India
Dr. R. P. Ramkumar
Professor, Department of CSE, Malla Reddy Engineering College (A) Telangana, India

Classified Data, LIME, Trademark, Malicious Environment, Micro Benchmarking, Pairing Based Cryptography, GNU

  1. Chronology of data breaches," http://www.pri"
  2. "Data breach cost,"
  3. "Pri"acy rights clearinghouse," http://www.pri"
  4. "Electronic Pri"acy Information Center (EPIC),", 1994.
  5. "Facebook in Pri"acy Breach,"
  6. "Offshore outsourcing," outsourcing cited in Florida data leak.
  7. A. Mascher-Kampfer, H. Stogner, and A. Uhl, "Multiple re-watermarking scenarios," in Proceedings of the 13th International Conference on Systems, Signals, and Image Processing (IWSSIP 2006). Citeseer, 2006, pp. 53-56.
  8. P. Papadimitriou and H. Garcia-Molina, "Data leakage detection," Knowledge and Data Engineering, IEEE Transactions on, "ol. 23, no. 1, pp. 51-63, 2011.
  9. "Pairing-Based Cryptography Library (PBC),"
  10. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," Image Processing, IEEE Transactions on, "ol. 6, no. 12, pp. 1673-1687, 1997.
  11. B. Pfitzmann and M. Waidner, "Asymmetric fingerprinting for larger collusions," in Proceedings of the 4th ACM conference on Computer and communications security, ser. CCS ’97, 1997, pp. 151-160.
  12. S. Goldwasser, S. Micali, and R. L. Ri"est, "A digital signature scheme secure against adapti"e chosen-message attacks," SIAM J. Comput., "ol. 17, no. 2, pp. 281-308, 1988.
  13. A. Adelsbach, S. Katzenbeisser, and A.-R. Sadeghi, "A computational model for watermark robustness," in Information Hiding. Springer, 2007, pp. 145-160.
  14. J. Kilian, F. T. Leighton, L. R. Matheson, T. G. Shamoon, R. E. Tarjan, and F. Zane, "Resistance of digital watermarks to collusi"e attacks," in IEEE International Symposium on Information Theory, 1998, pp. 271-271.
  15. M. Naor and B. Pinkas, "Efficient obli"ious transfer protocols," in Proceedings of the Twelfth Annual ACM-SIAM Symposium on Discrete Algorithms, 2001, pp. 448-457

Publication Details

Published in : Volume 5 | Issue 1 | January-February 2019
Date of Publication : 2019-01-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 123-130
Manuscript Number : CSEIT195116
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Amith Manda, Dr. R. P. Ramkumar, "Data Extraction in Malignant Environments", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 1, pp.123-130, January-February-2019. Available at doi :
Journal URL :

Article Preview