scholarly journals Decision Tree-Based Sensitive Information Identification and Encrypted Transmission System

Entropy ◽  
2020 ◽  
Vol 22 (2) ◽  
pp. 192
Author(s):  
Shuang Liu ◽  
Ziheng Yang ◽  
Yi Li ◽  
Shuiqing Wang

With the advent of the information age, the effective identification of sensitive information and the leakage of sensitive information during the transmission process are becoming increasingly serious issues. We designed a sensitive information recognition and encryption transmission system based on a decision tree. By training sensitive data to build a decision tree, unknown data can be classified and identified. The identified sensitive information can be marked and encrypted to achieve intelligent recognition and protection of sensitive information. This lays the foundation for the development of an information recognition and encryption transmission system.

In this modern era, all organizations depend on internet and data so, maintaining of all data is done by the third party in large organizations. But in this present on-developing world, one have to share the data inside or outside the organization which incorporates the sensitive data of the venture moreover. Data of the organization have sensitive data which should not share with any others but unfortunately, that data was there in the third party hands so; we need to protect the data and also have to identify the guilt agent. For this, we propose a model that would evaluate and correctly identifies guilt agents, for which a recursive partitioning has been created which is a decision tree that spills data in to the sub partitions and does the easiest way to get alert and at least one specialist or it can autonomously accumulate by some different means. The main intention of the model is to secure sensitive information by recognizing the leakage and distinguish the guilt agent.


2021 ◽  
Author(s):  
Babu M ◽  
Sathish Kumar G A

Abstract Recently, Encryption technology plays a vital role in providing secure information. In the multimedia sector, several images and posts are broadcasted via the internet on daily basis; in which the images are transmitted on social media and are subjected to several security attacks. Therefore it is necessary to protect the images from illegal or forbidden access. This paper aims in developing a novel SKECA-EMFO based encrypted transmission system. Here, an effective encryption transmission system is designed using a Bayes minimum risk classifier to secure the sensitive information during the transmission processes. In addition to this, the SM4 encryption algorithm is employed to perform high speed encrypted transmission as well as to achieve intelligent recognition. The novel SKECA-EMFO approach is employed in demonstrating facial expression recognition thereby obtaining an optimal feature set. Finally, seven benchmark functions are utilized to examine and evaluate the effectiveness of the newly developed proposed approach. The comparative analysis is carried out with few approaches and the results reveal that the proposed approach provides better performances when compared with other approaches.


Integration ◽  
2021 ◽  
Vol 78 ◽  
pp. 60-69
Author(s):  
M. Babu ◽  
G.A. Sathish Kumar

2018 ◽  
Vol 1 (1) ◽  
Author(s):  
Chai Jianwen

This paper mainly studies the basic concept of baseband transmission of digital signal and the transmission processof digital signal baseband transmission and how to design digital baseband transmission system with MATLABsoftware simulation. This paper fi rst introduces the theoretical basis of this subject, including digital communication,the composition of digital baseband transmission system and digital baseband signal transmission process. Then thepaper introduced the characteristics of digital baseband transmission system, including digital PAM signal powerdensity and common line pattern, and by comparing choosing the fi nal bipolar zero return code. Then we introducedthe MATLAB simulation software. The conditions of the best reception of the digital baseband signal are describedand how the waveform of the baseband signal is observed by an oscilloscope. Finally, according to the basic stepsof simulation process, the simulation process of digital baseband transmission system is realized by MATLABsimulation tool, and the system is analyzed.


2018 ◽  
Author(s):  
Jérémie Decouchant ◽  
Maria Fernandes ◽  
Marcus Völp ◽  
Francisco M Couto ◽  
Paulo Esteves-Veríssimo

AbstractSequencing thousands of human genomes has enabled breakthroughs in many areas, among them precision medicine, the study of rare diseases, and forensics. However, mass collection of such sensitive data entails enormous risks if not protected to the highest standards. In this article, we follow the position and argue that post-alignment privacy is not enough and that data should be automatically protected as early as possible in the genomics workflow, ideally immediately after the data is produced. We show that a previous approach for filtering short reads cannot extend to long reads and present a novel filtering approach that classifies raw genomic data (i.e., whose location and content is not yet determined) into privacy-sensitive (i.e., more affected by a successful privacy attack) and non-privacy-sensitive information. Such a classification allows the fine-grained and automated adjustment of protective measures to mitigate the possible consequences of exposure, in particular when relying on public clouds. We present the first filter that can be indistinctly applied to reads of any length, i.e., making it usable with any recent or future sequencing technologies. The filter is accurate, in the sense that it detects all known sensitive nucleotides except those located in highly variable regions (less than 10 nucleotides remain undetected per genome instead of 100,000 in previous works). It has far less false positives than previously known methods (10% instead of 60%) and can detect sensitive nucleotides despite sequencing errors (86% detected instead of 56% with 2% of mutations). Finally, practical experiments demonstrate high performance, both in terms of throughput and memory consumption.


2021 ◽  
Vol 27 (7) ◽  
pp. 650-666
Author(s):  
Xabier Larrucea ◽  
Micha Moffie ◽  
Dan Mor

Since the emergence of GDPR, several industries and sectors are setting informatics solutions for fulfilling these rules. The Health sector is considered a critical sector within the Industry 4.0 because it manages sensitive data, and National Health Services are responsible for managing patients’ data. European NHS are converging to a connected system allowing the exchange of sensitive information cross different countries. This paper defines and implements a set of tools for extending the reference architectural model industry 4.0 for the healthcare sector, which are used for enhancing GDPR compliance. These tools are dealing with data sensitivity and data hiding tools A case study illustrates the use of these tools and how they are integrated with the reference architectural model.


2008 ◽  
pp. 679-692
Author(s):  
Rodolfo Villarroel ◽  
Eduardo Fernandez-Medina ◽  
Juan Trujillo ◽  
Mario Piattini

Organizations depend increasingly on information systems, which rely upon databases and data warehouses (DWs), which need increasingly more quality and security. Generally, we have to deal with sensitive information such as the diagnosis made on a patient or even personal beliefs or other sensitive data. Therefore, a final DW solution should consider the final users that can have access to certain specific information. Unfortunately, methodologies that incorporate security are based on an operational environment and not on an analytical one. Therefore, they do not include security into the multidimensional approaches to work with DWs. In this chapter, we present a comparison of six secure-systems design methodologies. Next, an extension of the UML that allows us to specify main security aspects in the multidimensional conceptual modeling is proposed, thereby allowing us to design secure DWs. Finally, we present how the conceptual model can be implemented with Oracle Label Security (OLS10g).


2020 ◽  
Vol 8 (1) ◽  
pp. 82-91
Author(s):  
Suraj Krishna Patil ◽  
Sandipkumar Chandrakant Sagare ◽  
Alankar Shantaram Shelar

Privacy is the key factor to handle personal and sensitive data, which in large chunks, is stored by database management systems (DBMS). It provides tools and mechanisms to access and analyze data within it. Privacy preservation converts original data into some unknown form, thus protecting personal and sensitive information. Different access control mechanisms such as discretionary access control, mandatory access control is used in DBMS. However, they hardly consider purpose and role-based access control in DBMS, which incorporates policy specification and enforcement. The role based access control (RBAC) regulates the access to resources based on the roles of individual users. Purpose based access control (PuBAC) regulates the access to resources based on purpose for which data can be accessed. It regulates execution of queries based on purpose. The PuRBAC system uses the policies of both, i.e. PuBAC and RBAC, to enforce within RDBMS.


Sign in / Sign up

Export Citation Format

Share Document