scholarly journals Information leakage detection and protection of leaked information by using the MAC-IP binding technique

2018 ◽  
Vol 7 (1.7) ◽  
pp. 230 ◽  
Author(s):  
B. Raja Koti ◽  
G.V.S. Raj Kumar

The Digital world is advancing in terms of technological development day by day, resulting in an instantaneous rise in Data. This massive amount of Data has introduced the thought of Big Data, which has attracted both the business and IT sectors leaving the scope for huge opportunities. In turn, securing this massive data has become a challenging issue in the field of Information and Communication Technology. In this paper, we have carried out the work on business information sharing data which contains some sensitive information to investigate the security challenges of data in the field of business communication. The article an attempt is also made to identify the user’s intention or behavior during the navigation of data. The greatest challenge that is associated here is to prevent the integrity of the data while sharing the data from organization to the third party, where there exist huge chances of data loss, leakages or alteration. This paper highlights the concepts of data leakage, the techniques to detect the data leakage and the process of protecting the leaked data based on encrypted form.

In this modern era, all organizations depend on internet and data so, maintaining of all data is done by the third party in large organizations. But in this present on-developing world, one have to share the data inside or outside the organization which incorporates the sensitive data of the venture moreover. Data of the organization have sensitive data which should not share with any others but unfortunately, that data was there in the third party hands so; we need to protect the data and also have to identify the guilt agent. For this, we propose a model that would evaluate and correctly identifies guilt agents, for which a recursive partitioning has been created which is a decision tree that spills data in to the sub partitions and does the easiest way to get alert and at least one specialist or it can autonomously accumulate by some different means. The main intention of the model is to secure sensitive information by recognizing the leakage and distinguish the guilt agent.


Author(s):  
Manish Ranjan ◽  
Ayub Hussain Mondal ◽  
Monjul Saikia

<p>Cloud based service provider are at its top of its services for various applications, as their services are very much reachable from anywhere anytime in current days. It is responsibility of the company that the Cloud storage is owned and maintained by themselves keeping the data available and accessible, and the physical environment protected and running. Could storage provider seem to be uncertain of confidentiality in many cases, as we need to limit ourselves on trust to a third party. Keeping our sensitive data ready to access any time anywhere with preventing any information leakage is a challenging task. Cryptography in this scenario plays an important role, providing security for information to protect valuable information resources on intranets, Internet and the cloud. In addition, Homomorphic cryptosystem is a form of Cryptography where some specific computation can be performed over the cipher text producing a resultant cipher text which, when decrypted, equals the result of operations carry out on the plaintext. With help of this unique property of homomorphism cryptography we proposed a system to keep sensitive information in encrypted form in the cloud storage/service provider and used those data as whenever we require. The scheme proposed here is designed for a secure online voting system on Android platform and voted information is encrypted and stored those in the cloud.</p>


2022 ◽  
pp. 489-505
Author(s):  
Ethem Merdan

Technology is present in every moment of our lives and has become a part of our lives. Developments in information and communication technologies affect and facilitate social life and business life day by day. Although the positive aspects of technological developments are generally mentioned, it also brings many negativities. One of these downsides is cyberbullying. Cyberbullying can be expressed as behaviors that hurt, humiliate, disturb, frighten, exclude, and cause victimization by using information and communication technologies of the individual. These behaviors can cause an individual's job and life satisfaction to decrease anxiety, sadness, tension, and loss of motivation. In this case, it becomes difficult for the individual to be effective and efficient in his/her business and social life. For this, it is useful to combat cyberbullying, and it is important to develop combat strategies for it. Otherwise, cyberbullying cannot be prevented. With the precautions, most cyberbullying can be prevented before it happens.


2021 ◽  
Vol 24 (3) ◽  
pp. 1-36
Author(s):  
Meisam Mohammady ◽  
Momen Oqaily ◽  
Lingyu Wang ◽  
Yuan Hong ◽  
Habib Louafi ◽  
...  

As network security monitoring grows more sophisticated, there is an increasing need for outsourcing such tasks to third-party analysts. However, organizations are usually reluctant to share their network traces due to privacy concerns over sensitive information, e.g., network and system configuration, which may potentially be exploited for attacks. In cases where data owners are convinced to share their network traces, the data are typically subjected to certain anonymization techniques, e.g., CryptoPAn, which replaces real IP addresses with prefix-preserving pseudonyms. However, most such techniques either are vulnerable to adversaries with prior knowledge about some network flows in the traces or require heavy data sanitization or perturbation, which may result in a significant loss of data utility. In this article, we aim to preserve both privacy and utility through shifting the trade-off from between privacy and utility to between privacy and computational cost. The key idea is for the analysts to generate and analyze multiple anonymized views of the original network traces: Those views are designed to be sufficiently indistinguishable even to adversaries armed with prior knowledge, which preserves the privacy, whereas one of the views will yield true analysis results privately retrieved by the data owner, which preserves the utility. We formally analyze the privacy of our solution and experimentally evaluate it using real network traces provided by a major ISP. The experimental results show that our approach can significantly reduce the level of information leakage (e.g., less than 1% of the information leaked by CryptoPAn) with comparable utility.


Author(s):  
T Okebule ◽  
◽  
O.A. Adeyemo ◽  
K.A. Olatunji ◽  
A.S Awe

The advent of android operating system introduced tools to keep track of users’ information activities and prevent information leakage which bridged the trust between application developers and consumers. Literature shows that several phenomena had been developed to prevent malicious applications from stealing personal sensitive information from smart phones but there is still the need for efficient solutions. This study proposes a conceptual approach for the development of a contentAnalyzer for information leakage detection and prevention on android-based devices. The concept will help to minimize false positives that will in turn lead to increase in code coverage towards detecting the maximum number of data leaks. The proposed concept combines both static and dynamic analysis, and if implemented will improve checking through the codes in the file activities and vulnerabilities that could be a problem. Keywords: Android, ContentAnalyzer, Static Analysis, Dynamic Analysis, Information leakage, Information leakage detection, Information leakage Prevention.


Author(s):  
Manish Ranjan ◽  
Ayub Hussain Mondal ◽  
Monjul Saikia

<p>Cloud based service provider are at its top of its services for various applications, as their services are very much reachable from anywhere anytime in current days. It is responsibility of the company that the Cloud storage is owned and maintained by themselves keeping the data available and accessible, and the physical environment protected and running. Could storage provider seem to be uncertain of confidentiality in many cases, as we need to limit ourselves on trust to a third party. Keeping our sensitive data ready to access any time anywhere with preventing any information leakage is a challenging task. Cryptography in this scenario plays an important role, providing security for information to protect valuable information resources on intranets, Internet and the cloud. In addition, Homomorphic cryptosystem is a form of Cryptography where some specific computation can be performed over the cipher text producing a resultant cipher text which, when decrypted, equals the result of operations carry out on the plaintext. With help of this unique property of homomorphism cryptography we proposed a system to keep sensitive information in encrypted form in the cloud storage/service provider and used those data as whenever we require. The scheme proposed here is designed for a secure online voting system on Android platform and voted information is encrypted and stored those in the cloud.</p>


2016 ◽  
Vol 2 (2) ◽  
Author(s):  
Prof. Nirav Halvadia ◽  
Prof. (Dr.) Ajay Joshi ◽  
Prof. Shekha Patel

E-governance system means the use of a range of modern Information and Communication Technologies (ICT) such as Internet, Local Area Network, and Mobiles etc, by Government to improve the effectiveness, efficiency, service delivery and to promote democracy. Gujarat is a frontline state in the implementation of e-governance policies & projects and setting up of key infrastructure for e-governance. This article deals with role of Gujarat egovernance system in improving Government to Government, Government to Citizen and Government to Business communication. This article also gives overview of system, E-governance system and benefits of.


2021 ◽  
pp. 238133772110275
Author(s):  
Elizabeth (Betsy) A. Baker

In the spring of 2020, schools across the country and world closed. COVID-19 reached pandemic proportions. Were schools prepared? Was there a research base available to help schools prepare students for reading and writing digital texts? The ability to read, analyze, compose, and communicate with digital texts requires digital literacies. However, the rapid-fire development of information and communication technologies (ICTs) makes the identification of digital literacies and the development of curriculum and instruction a moving target. In her Literacy Research Association Presidential Address, Dr. Betsy Baker asserts that digital literacies are no longer an entity separate from reading and writing instruction, they are no longer a technology issue, students live in a digital world, and digital literacies are not optional. Digital literacies have become the literacies of our culture. Baker synthesizes over 25 years of research to propose that digital literacies are persistently public, semiotic, product-oriented, and transitory. Researchers, educational leaders, and teachers can leverage these characteristics as footholds to identify ever-changing digital literacies, design curricula, and provide instruction so that all students can be autonomous as they seek to thrive in a digital world. Dr. Baker’s Presidential Address is available online (see https://youtu.be/Avzup21ZnA4 ).


2019 ◽  
Vol 9 (S1) ◽  
pp. 58-63
Author(s):  
S. Lakshmi ◽  
L. Santhi

Academic Libraries nowadays have to relate all its activities to public and its users very often and keep them updated with the changes and Updation in the Library. In order to attract the users and sustain in this modern ICT world, the user’s complete satisfaction is the ultimatum. We are in a digital world where one need not physically go to the Library or a computer to get information they want. Just a swipe on their smart phone and they have their required information in their finger tips. They just require a device to login and an internet or Wi-Fi connection. That’s it. This study is about the marketing of information products and services among users of M. Kumarasamy College of Engineering, Karur. From this research it is found that the marketing of services has been a great challenge with limited budget as well as the emerging ICT tools and technology day by day. The study shows the user behavior, their awareness level, usage, usefulness & the marketing strategies used in the College Library for promoting their services. This paper also suggests that Librarians have to be proactive in marketing their information sources & services with the help of current marketing strategies using ICT which is the need of the hour.


Sign in / Sign up

Export Citation Format

Share Document