scholarly journals Identification of Information Leakage and Guilt Agent by using MAC-IP Binding and Recursive Partitioning Algorithm to Modulate the Uncertainty in the Organization’s Network

In this modern era, all organizations depend on internet and data so, maintaining of all data is done by the third party in large organizations. But in this present on-developing world, one have to share the data inside or outside the organization which incorporates the sensitive data of the venture moreover. Data of the organization have sensitive data which should not share with any others but unfortunately, that data was there in the third party hands so; we need to protect the data and also have to identify the guilt agent. For this, we propose a model that would evaluate and correctly identifies guilt agents, for which a recursive partitioning has been created which is a decision tree that spills data in to the sub partitions and does the easiest way to get alert and at least one specialist or it can autonomously accumulate by some different means. The main intention of the model is to secure sensitive information by recognizing the leakage and distinguish the guilt agent.

In Cloud Storage Server, data integrity plays an important role, given cloud clients might not be aware whether the data is safe or has been tampered with. This system introduces identity-based signature algorithms to protect data that belongs to the data owner and gets the status of cloud data by means of verification through signatures. Since it is practically not possible for the data owner to be available online all the time for checking cloud data integrity, Third party auditor is tasked with verifying the data integrity every time instead of data owner. The Third party auditors should not read the cipher text data while verifying and must authenticate itself to cloud server by performing Proof of Knowledge operation; then cloud server can reveal the sensitive data as block wise and the third party auditor can verify the signature without knowledge of cipher text data. Finally, an audit report is sent to the data owner. This work demonstrates data security and integrity in the cloud..


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Hao Xu ◽  
Weifeng Liu ◽  
Xu Liu

Cloud computing uses virtualization technology to provide users with different types of resources in the form of services. The third party plays a crucial role in coordinating cloud market between cloud providers and users. As for providing services or trading, the extra broker fees are required for the middleman because the third party facilitates transactions. Moreover, there is no guarantee that the third party is trusted, which can lead to information leakage, data tampering, and unfair trading. Blockchain technology is an emerging technology that can store and communicate data between entities that unnecessarily trust each other. To resolve the problems, this paper presents the blockchain-based trust and fair system and develops the smart contract of auction and transaction. The prototype system is implemented based on the Hyperledger Fabric. The experimental results prove the feasibility of the scheme.


NOTARIUS ◽  
2018 ◽  
Vol 11 (1) ◽  
pp. 100
Author(s):  
Nila Mandasari

AbstractGrant Agreement in the modern era has been regarded as a normal thing, but most of the implementations found incorrect according to legislation. The method used in this research is juridical empirical, specification of this research is descriptive. Deed of grant can be canceled after the grant was not carried out as required, that is done by notary deed pursuant to Article 1682 joint 1683 of the Civil Code. Then if the donated goods are not the property of the grantor in violation of the provisions of Article 200 Compilation of Islamic law is an act which is done in the framework of the delivery of goods / items from the grantor to the grantee and the goods delivered are the properties of their own. Then, if the grantor proved to have died when the deed of grant was made contrary to the provisions of Article 1666 of the Civil Code clearly confirms that the grant is an agreement by who provides grants, at the time of his life, freely and irrevocably, handed some object for the purposes of the grant recipient to take advantage of it. Then grant that exceed 1/3 of his property contrary to the provisions of Article 210 paragraph (2) Compilation of Islamic Law. As a result the consequences of legal defect for internal party and the third party of the cancellation of the deed of grant ownership of the property / land will be returned to the grantor / owner of the land. AbstrakPembuatan Perjanjian Hibah di era modern sudah dianggap sebagai hal yang lumrah, akan tetapi dalam implementasinya banyak pembuatan perjanjian hibah tidak sesuai dengan peraturan perundang-undangan yang berlaku. Metode pendekatan yang digunakan dalam penelitian ini adalah yuridis empiris, spesifikasi penelitian ini adalah deskriptif analitis. Pemberian hibah sebagai perjanjian sepihak terjadi cacat hukum jika hal tersebut tidak dengan akta Notaris berdasarkan ketentuan Pasal 1682 jo 1683 KUHPerdata. Apabila barang yang dihibahkan bukan barang milik pemberi hibah, melanggar ketentuan Pasal 200 Kompilasi Hukum Islam yaitu suatu perbuatan yang dilakukan dalam rangka penyerahan suatu barang/benda dari pemberi hibah kepada penerima hibah dan barang yang diserahkan tersebut adalah barang milik sendiri. Kemudian apabila si pemberi hibah terbukti sudah meninggal dunia ketika akta hibah dibuat, bertentangan dengan ketentuan Pasal 1666 KUHPerdata menegaskan bahwa hibah adalah suatu perjanjian dengan mana si penghibah, di waktu hidupnya, dengan cuma-cuma dan dengan tidak dapat ditarik kembali, menyerahkan sesuatu benda guna keperluan si penerima hibah yang menerima penyerahan itu. Kemudian pengibahan yang melebihi 1/3 harta bendanya bertentangan dengan ketentuan Pasal 210 ayat (2) Kompilasi Hukum Islam. Implikasi dari akta hibah yang cacat hukum bagi pihak interrnal dan pihak ketiga adalah kepemilikan atas harta/tanah tersebut akan kembali kepada pemberi hibah/pemilik tanah.  


2014 ◽  
Author(s):  
Jaclyn M. Moloney ◽  
Chelsea A. Reid ◽  
Jody L. Davis ◽  
Jeni L. Burnette ◽  
Jeffrey D. Green

Author(s):  
Chen Lei

This chapter examines the position of third party beneficiaries in Chinese law. Article 64 of the Chinese Contract Law states that where a contract for the benefit of a third party is breached, the debtor is liable to the creditor. The author regards this as leaving unanswered the question of whether the thirdparty has a right of direct action against the debtor. One view regards the third party as having the right to sue for the benefit although this right was ultimately excluded from the law. Another view, supported by the Supreme People’s Court, is that Article 64 does not provide a right of action for a third party and merely prescribes performance in ‘incidental’ third party contracts. The third view is that there is a third party right of action in cases of ‘genuine’ third party contracts but courts are unlikely to recognize a third party action where the contract merely purports to confer a benefit on the third party.


Author(s):  
Sheng-Lin JAN

This chapter discusses the position of third party beneficiaries in Taiwan law where the principle of privity of contract is well established. Article 269 of the Taiwan Civil Code confers a right on the third party to sue for performance as long as the parties have at least impliedly agreed. This should be distinguished from a ‘spurious contract’ for the benefit of third parties where there is no agreement to permit the third party to claim. Both the aggrieved party and the third party beneficiary can sue on the contract, but only for its own loss. The debtor can only set off on a counterclaim arising from its legal relationship with the third party. Where the third party coerces the debtor into the contract, the contract can be avoided, but where the third party induces the debtor to contract with the creditor by misrepresentation, the debtor can only avoid the contract if the creditor knows or ought to have known of the misrepresentation.


2004 ◽  
Vol 95 (3) ◽  
pp. 965-968
Author(s):  
Elizabeth Qaqiesh ◽  
Pamela C. Regan

An experiment was conducted to examine whether attitudes toward extrarelational sex, i.e., “swinging,” differed as a function of participant's gender and gender of the third party, i.e., the “swinging” partner. Participants were asked to imagine that their current romantic partner had expressed an interest in “swinging” with another individual (male or female, randomly assigned). Analysis yielded several significant differences by participants' gender. Specifically, men expressed greater interest than did women in joining a swinger's club, reported a higher likelihood than did women of actually joining such a club, and believed more than women that their sex life with their partner would improve after joining a swinger's club. Participants also preferred a female more than a male swinging partner, although this comparison was not statistically significant.


Sign in / Sign up

Export Citation Format

Share Document