Data Lineage in Malign Environments

Authors

  • Harish Chittineni  M-Tech, Department of CSE, Mallareddy Engineering College (Autonomous) Hyderabad, Telangana, India
  • P A Hima Kiran  Associate Professor Department of CSE, Mallareddy Engineering College (Autonomous) Hyderabad, Telangana, India

Keywords:

Information spillage, information ancestry, responsibility, calculation outline and examination, fingerprinting, absent exchange, watermarking, open key cryptosystems, security and protection sponsorship.

Abstract

Deliberate or unexpected spillage of classified information is indubitably a standout amongst the most thorough security dangers that associations confront in the computerized period. The danger now lengthens to our own lives: a plenty of individual data is accessible to gregarious systems and cell phone suppliers and is in a roundabout way exchanged to deceitful outsider and fourth gathering applications. In this work, we show a non specific information genealogy structure LIME for information stream over numerous substances that take two trademark, central parts (i.e., proprietor and purchaser). We characterize the correct security ensures required by such an information heredity instrument toward distinguishing proof of a punishable substance, and recognize the streamlining non-denial and veracity sets. We at that point create and investigate a novel responsible information exchange convention between two substances inside a wrathful situation by expanding upon neglectful exchange, vigorous watermarking, and mark primitives. Indisputably, we play out an exploratory assessment to exhibit the common sense of our convention and apply our system to the vital information spillage situations of information outsourcing and gregarious systems. All in all, we consider LIME, our genealogy system for information exchange, to be a key stride towards accomplishing responsibility by plan.

References

  1. Michael Backes, Niklas Grimm, and Aniket Kate "Data Lineage in Malicious Environments" ieee transactions on dependable and secure computing, vol. 13, no. 2, march/april 2016.
  2. Chronology of data breaches Online]. Available: http://www. privacyrights.org/data-breach, 2014.
  3. Privacy rights clearinghouse Online]. Available: http://www.privacyrights.org, 2014.
  4. (1994). Electronic privacy information center (EPIC) Online].Available: http://epic.org, 1994.
  5. Facebook in privacy breach Online]. Available: http://online.wsj.com/article/SB10001424052702304772804575558484075236968.ht ml, 2010.
  6. Offshore outsourcing Online]. Available: http://www.computerworld. com/s/article/109938/Offshore_outsourcing_cite d_in_Florida_data_leak, 2006.
  7. A. Mascher-Kampfer, H. St€ogner, and A. Uhl, Multiple re-watermarking scenarios, in Proc. 13th Int. Conf. Syst., Signals, Image Process., 2006, pp. 53-56.
  8. P. Papadimitriou and H. Garcia-Molina, Data leakage detection, IEEE Trans. Knowl. Data Eng., vol. 23, no. 1, pp. 51-63, Jan. 2011.
  9. Pairing-based cryptography library (PBC) Online]. Available: http://crypto.stanford.edu/pbc, 2014.
  10. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia,? IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
Harish Chittineni, P A Hima Kiran, " Data Lineage in Malign Environments, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 6, pp.353-356, September-October-2017.