Data Lineage in Malign Environments

Authors(2) :-Harish Chittineni, P A Hima Kiran

Deliberate or unexpected spillage of classified information is indubitably a standout amongst the most thorough security dangers that associations confront in the computerized period. The danger now lengthens to our own lives: a plenty of individual data is accessible to gregarious systems and cell phone suppliers and is in a roundabout way exchanged to deceitful outsider and fourth gathering applications. In this work, we show a non specific information genealogy structure LIME for information stream over numerous substances that take two trademark, central parts (i.e., proprietor and purchaser). We characterize the correct security ensures required by such an information heredity instrument toward distinguishing proof of a punishable substance, and recognize the streamlining non-denial and veracity sets. We at that point create and investigate a novel responsible information exchange convention between two substances inside a wrathful situation by expanding upon neglectful exchange, vigorous watermarking, and mark primitives. Indisputably, we play out an exploratory assessment to exhibit the common sense of our convention and apply our system to the vital information spillage situations of information outsourcing and gregarious systems. All in all, we consider LIME, our genealogy system for information exchange, to be a key stride towards accomplishing responsibility by plan.

Authors and Affiliations

Harish Chittineni
M-Tech, Department of CSE, Mallareddy Engineering College (Autonomous) Hyderabad, Telangana, India
P A Hima Kiran
Associate Professor Department of CSE, Mallareddy Engineering College (Autonomous) Hyderabad, Telangana, India

Information spillage, information ancestry, responsibility, calculation outline and examination, fingerprinting, absent exchange, watermarking, open key cryptosystems, security and protection sponsorship.

  1. Michael Backes, Niklas Grimm, and Aniket Kate "Data Lineage in Malicious Environments" ieee transactions on dependable and secure computing, vol. 13, no. 2, march/april 2016.
  2. Chronology of data breaches Online]. Available: http://www. privacyrights.org/data-breach, 2014.
  3. Privacy rights clearinghouse Online]. Available: http://www.privacyrights.org, 2014.
  4. (1994). Electronic privacy information center (EPIC) Online].Available: http://epic.org, 1994.
  5. Facebook in privacy breach Online]. Available: http://online.wsj.com/article/SB10001424052702304772804575558484075236968.ht ml, 2010.
  6. Offshore outsourcing Online]. Available: http://www.computerworld. com/s/article/109938/Offshore_outsourcing_cite d_in_Florida_data_leak, 2006.
  7. A. Mascher-Kampfer, H. St€ogner, and A. Uhl, Multiple re-watermarking scenarios, in Proc. 13th Int. Conf. Syst., Signals, Image Process., 2006, pp. 53-56.
  8. P. Papadimitriou and H. Garcia-Molina, Data leakage detection, IEEE Trans. Knowl. Data Eng., vol. 23, no. 1, pp. 51-63, Jan. 2011.
  9. Pairing-based cryptography library (PBC) Online]. Available: http://crypto.stanford.edu/pbc, 2014.
  10. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia,? IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.

Publication Details

Published in : Volume 3 | Issue 6 | September-October 2017
Date of Publication : 2017-10-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 353-356
Manuscript Number : IJSRSET173671
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Harish Chittineni, P A Hima Kiran, " Data Lineage in Malign Environments, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 6, pp.353-356, September-October-2017.
Journal URL : http://ijsrset.com/IJSRSET173671

Follow Us

Contact Us