Downloads: 121 | Views: 267
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.8 / 10
Avoidance of Sensitive Data Exposure in Intramail System Using MD5 Algorithm
Jissmol T Antony, Gopal B
Abstract: During the last few years the number of leaked sensitive data records in email system has increased dramatically). Among various data-leak cases human mistakes are one of the main causes of data loss in mail system. The existing technique is to avoid data-leak is monitor the content in storage and before transmission which is not proficient to provide protection to sensitive data and it is not capable to avoid the sensitive data leak in email system. The proposed method adds a double layer security to the sensitive data in intra mail system using the session password and comparison of the document with sensitive data repository. The amount of sensitive data in the document is verified by comparing the message digest of sensitive words in the document with the sensitive data repository where the sensitive s message digest is already stored for the purpose of the comparison using MD5 algorithm. Once the comparison is complete, with the help of Term frequency process the system measures how frequently a sensitive term occurs in the selected document and produces the result.
Keywords: Intramail system, Pair based matrix, MD5 Algorithm, Term frequency-Inverse document frequency, Session Password
Edition: Volume 5 Issue 6, June 2016
Pages: 632 - 634
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 1998
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 714
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 694
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 696
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 683
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera