International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111 | Views: 246

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016 | Popularity: 6.6 / 10


     

Data Hopping in Malicious Environment

S Mohammed Ghouse, Sheethal R


Abstract: Deliberate or inadvertent spillage of private information is without a doubt a standout amongst the most serious security dangers that associations face in the computerized period. The risk now stretches out to our own lives a plenty of individual data is accessible to informal organizations and Smartphone suppliers and is in a roundabout way exchanged to deceitful outsider and fourth gathering applications. In this work, we show a non specific information ancestry structure LIME for information stream over various elements that take two trademark, important parts (i. e. , proprietor and buyer). We characterize the definite security ensures required by such an information ancestry instrument toward distinguishing proof of a blameworthy element, and recognize the improving non-disavowal and genuineness suppositions. We then create and examine a novel responsible information exchange convention between two elements inside a pernicious domain by expanding upon unmindful exchange, strong watermarking, and mark primitives. At long last, we perform an exploratory assessment to show the reasonableness of our convention and apply our system to the critical information spillage situations of information outsourcing and interpersonal organizations. As a rule, we consider LIME, our ancestry system for information exchange, to be a key step towards accomplishing responsibility by outline


Keywords: Smartphone, security threats, data lineage, LIME, robust watermarking, signature primitives and accountability


Edition: Volume 5 Issue 5, May 2016


Pages: 1253 - 1261



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
S Mohammed Ghouse, Sheethal R, "Data Hopping in Malicious Environment", International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 1253-1261, https://www.ijsr.net/getabstract.php?paperid=NOV163404, DOI: https://www.doi.org/10.21275/NOV163404



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 1583 - 1588

Automatic Redeployment Rescue System

S. Preethi, K. Madhumalar, G. Priyanaka, D. Reethu, A. Joyce

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 832 - 839

Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach

Mohammed Saleem Sultan, Mohammed Shahid Sultan

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 1372 - 1378

RescueMe: Self Rescue Application Using Smartphone

I. Vallirathi

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 12 Issue 12, December 2023

Pages: 2074 - 2078

DevSecOps: Integrating Security into the DevOps Pipeline

Dinesh Reddy Chittibala

Share this Article

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, United States of America, Volume 13 Issue 3, March 2024

Pages: 1181 - 1184

Threat Detection in Cloud Banking Using Machine Learning

Ravi Jagadish

Share this Article



Top