+(91) 99007-25045
support@evolettechnologies.com
Data Lineage in Malicious Environments
  • Data Lineage in Malicious Environments

Data Lineage in Malicious Environments

  • Description
  • Reviews (0)

Product Description

Data Lineage Malicious Environments Final year IEEE projects 2017

In the digital era, the Intentional or unintentional leakage of confidential data is one of the most severe security threats in organizations.

The threat now extends to our personal lives: a plethora of personal information is available to social networks and smart phone providers and is indirectly transferred to untrustworthy third party and fourth party applications.

The proposed system presents a generic data lineage framework Lime for data flow across multiple entities that take two characteristic, principal roles like owner and consumer. Data Lineage Malicious Environments Final year IEEE projects 2017 The proposed system defines the exact security which is required by a data lineage mechanism toward identification of a guilty entity, and identifies the simplifying non-repudiation and honesty assumptions.

The proposed system develop and analyze a novel accountable data transfer protocol between two entities within a malicious environment by building upon oblivious transfer, robust watermarking, and signature primitives.

Finally, an experimental evaluation to demonstrate the practicality of the proposed protocol is performed and the framework is applied to the important data leakage scenarios of data outsourcing and social networks.Data Lineage Malicious Environments Final year IEEE projects 2017 In general, Lime, a lineage framework is considered for data transfer, to be a key step towards achieving accountability by design.

Reviews

There are no reviews yet. Add a review