scholarly journals Information Sharing by Spanning Trees of a Graph by Labelled Sequence as a Key

2019 ◽  
Vol 8 (3) ◽  
pp. 3498-3503

Keeping the Information Sharing to manage cyber risks as a key, Security Intelligence speaks about secured data every day in today’s world. Hence it is considered that Cyber security is a Data Analytics challenge. For this reason, many researchers were effectively working on privacy protection and Liability protection. As a supporting hand for these global issues to secure data transfer, we propose a method to encrypt and decrypt the messages instantly by spanning trees of a graph with labelled tree sequences.

Author(s):  
Amit Dengre ◽  
A.D. Gawande

The growth of high speed computer networks and that of the Internet, in particular, has increased the ease of Information Communication. Ironically, the cause for the development is also of the apprehension - use of digital formatted data. In comparison with Analog media, Digital media offers several distinct advantages such as high quality, easy editing, high fidelity copying, compression etc. But this type advancement in the field of data communication in other sense has hiked the fear of getting the data snooped at the time of sending it from the sender to the receiver. So, Information Security is becoming an inseparable part of Data Communication. In order to address this Information Security, Steganography plays an important role. Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. In the current internet community, secure data transfer is limited due to its attack made on data communication. So more robust methods are chosen so that they ensure secured data transfer. One of the solutions which came to the rescue is the audio Steganography. But existing audio steganographic systems have poor interface, very low level implementation, difficult to understand and valid only for certain audio formats with restricted message size. Enhanced Audio Steganography (EAS) is one proposed system which is based on audio Steganography and cryptography & watermarking, ensures secure data transfer between the source and destination.


Author(s):  
S. K. Saravanan ◽  
G. N. K. Suresh Babu

In contemporary days the more secured data transfer occurs almost through internet. At same duration the risk also augments in secure data transfer. Having the rise and also light progressiveness in e – commerce, the usage of credit card (CC) online transactions has been also dramatically augmenting. The CC (credit card) usage for a safety balance transfer has been a time requirement. Credit-card fraud finding is the most significant thing like fraudsters that are augmenting every day. The intention of this survey has been assaying regarding the issues associated with credit card deception behavior utilizing data-mining methodologies. Data mining has been a clear procedure which takes data like input and also proffers throughput in the models forms or patterns forms. This investigation is very beneficial for any credit card supplier for choosing a suitable solution for their issue and for the researchers for having a comprehensive assessment of the literature in this field.


2015 ◽  
Vol 8 (1) ◽  
pp. 17 ◽  
Author(s):  
R. Valarmathi ◽  
G. M. Kadhar Nawaz

2019 ◽  
Vol 42 (2) ◽  
Author(s):  
Alan Toy ◽  
Gehan Gunasekara

The data transfer model and the accountability model, which are the dominant models for protecting the data privacy rights of citizens, have begun to present significant difficulties in regulating the online and increasingly transnational business environment. Global organisations take advantage of forum selection clauses and choice of law clauses and attention is diverted toward the data transfer model and the accountability model as a means of data privacy protection but it is impossible to have confidence that the data privacy rights of citizens are adequately protected given well known revelations regarding surveillance and the rise of technologies such as cloud computing. But forum selection and choice of law clauses no longer have the force they once seemed to have and this opens the possibility that extraterritorial jurisdiction may provide a supplementary conceptual basis for championing data privacy in the globalised context of the Internet. This article examines the current basis for extraterritorial application of data privacy laws and suggests a test for increasing their relevance.


2016 ◽  
Vol 9 (17) ◽  
Author(s):  
A. S. R. Murty ◽  
K. Phani Mounika ◽  
K. Anusha Reddy ◽  
K. Bhanu Karthik
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document