scholarly journals LEAKING AGENT DETECTION AND EMAIL FILTERING

Author(s):  
GIRISH SHANKAR ◽  
SOMESHWAR DHAYALAN ◽  
ASHISH ANAND

Leaking of confidential data to an unauthorized agent is a major concern for an organization. In this article we seek to detect the trusted node that leaks the confidential data to an unauthorized agent. Traditionally, leakage of data is handled by water marking technique which requires data modification. If the watermarked copy is found at some unauthorized site then distributor can claim his ownership. But one of the issues with watermarking method is data modification. To overcome the disadvantages of using watermark, data allocation strategies are used to improve the probability of identifying guilty third parties. The idea is to distribute the data intelligently to agents based on sample data request and explicit data request in order to improve the chance of detecting the guilty agents. Modern business activities also rely on extensive email exchange. Email leakages have become widespread, and the severe damage caused by such leakages constitutes a disturbing problem for organizations. Hence, filtering of E-mails is also necessary. This can be done by blocking E-mails which contains images, videos or sensitive data and filtering the text file of an organization.

2005 ◽  
Vol 4 (2) ◽  
pp. 393-400
Author(s):  
Pallavali Radha ◽  
G. Sireesha

The data distributors work is to give sensitive data to a set of presumably trusted third party agents.The data i.e., sent to these third parties are available on the unauthorized places like web and or some ones systems, due to data leakage. The distributor must know the way the data was leaked from one or more agents instead of as opposed to having been independently gathered by other means. Our new proposal on data allocation strategies will improve the probability of identifying leakages along with Security attacks typically result from unintended behaviors or invalid inputs.  Due to too many invalid inputs in the real world programs is labor intensive about security testing.The most desirable thing is to automate or partially automate security-testing process. In this paper we represented Predicate/ Transition nets approach for security tests automated generationby using formal threat models to detect the agents using allocation strategies without modifying the original data.The guilty agent is the one who leaks the distributed data. To detect guilty agents more effectively the idea is to distribute the data intelligently to agents based on sample data request and explicit data request. The fake object implementation algorithms will improve the distributor chance of detecting guilty agents.


Author(s):  
VIRGINIE MARION-POTY ◽  
SERGE MIGUET

This paper discusses several data allocation strategies used for the parallel implementation of basic imaging operators. It shows that depending on the operator (sequential or parallel, with regular or irregular execution time), the image data must be partitioned in very different manners: The square sub-domains are best adapted for minimizing the communication volume, but rectangles can perform better when we take into account the time for constructing messages. Block allocations are well adapted for inherently parallel operators since they minimize interprocessor interactions, but in the case of recursive operators, they lead to nearly sequential executions. In this framework, we show the usefulness of block-cyclic allocations. Finally, we illustrate the fact that allocating the same amount of image data to each processor can lead to severe load imbalance in the case of some operators with data-dependant execution times.


2012 ◽  
Vol 28 (3) ◽  
pp. 349-363 ◽  
Author(s):  
Cesare Ferri ◽  
Dimitra Papagiannopoulou ◽  
R. Iris Bahar ◽  
Andrea Calimera

Author(s):  
Rusul Mohammed Neamah ◽  
Jinan Ali Abed ◽  
Elaf Ali Abbood

At the moment, with the great development of information and communications technology, the transfer of confidential and sensitive data through public communications such as the Internet is very difficult to keep them from hackers and attackers. Therefore, it is necessary to work on the development of new and innovative ways to transfer such information and protect it to ensure that it reaches the desired goal. The goal of a new technique to hide information design not only hides the secret message behind the center cover, but it also provides increased security. The most common way to transfer important and confidential data is through embedding it into cover medium files in a way that does not affect the accuracy of the carrier file, which is known as hiding. In this paper, encryption and concealment techniques were used to protect data transferred from attackers. The proposed method relied on encryption of confidential information using the encryption key and the Xnor gate, after which the encrypted information was hidden in a color image using the LSB algorithm. The method of concealment depends on the extraction of chromatic channels of three RGB for each pixel and specifying the channel in which the bit of the encryption message will be hidden. Some metrics have been adopted to measure the quality of the resulting picture after hiding as PSNR and MSE, and achieve good results.


2019 ◽  
Vol 8 (4) ◽  
pp. 4860-4867

With the emergence of network-based computing technologies like Cloud Computing, Fog Computing and IoT (Internet of Things), the context of digitizing the confidential data over the network is being adopted by various organizations where the security of that sensitive data is considered as a major concern. Over a decade there is a massive growth in the usage of internet along with the technological advancements that demand the need for the development of efficient security algorithms that could withstand various patterns of the security breaches. The DDoS attack is the most significant network-based attack in the domain of computer security that disrupts the internet traffic of the target server. This study mainly focuses to identify the advancements and research gaps in the development of efficient security algorithms addressing DDoS attacks in various ubiquitous network environments.


In today`s digital scenario it has become very essential to maintain secrecy of criminal records otherwise forgery could happen. Using steganography it is possible to provide security for the information which is communicated over the internet from one crime branch to the other. Steganography one of the emerging security fields works to mask the very existence of the message. A wide range of carrier file formats can be utilized, but digital steganography is the extremely beneficial data hiding technique to secure criminal image as well as the crime scene images. Various applications have various prerequisites of the steganography method utilized. In this paper, we proposed CRSS (Criminal Record Security System) an image steganography method with LSB and RSA technique for enhanced security and along with that Raspberry pi and GSM module is used. Thus, for a more secure approach, the proposed method hides the criminal`s confidential records such as criminal`s image, crime scene digital images etc. using LSB steganography and also encrypts the confidential data making use of a private key using RSA algorithm and then sends it to the desired end. The receiver then decrypts the confidential data to get the original criminal information. CRSS is also proposed to send a QR code to the receiver which hides sensitive data and may include criminal`s previous crime history and other written proofs which are scanned at the receiving end reveals the entire criminal record. The entire system is implemented on Raspberry Pi 3 processor and thus a secure transmission of data without traditional desktop dependency in a more economical way could be established.


Author(s):  
Ratish Agarwal ◽  
Anjana Pandey ◽  
Mahesh Pawar

Cloud computing is being anticipated as the infrastructural basis of tomorrow's IT industry and continues to be a topic of interest of many new emerging IT firms. Cloud can deliver resources and services to computers and devices through internet. Since Cloud Computing involves outsourcing of sensitive data and critical information the security aspects of cloud need to be dealt carefully. Strong authentication, focusing mainly on user-authentication, acts as a pre-requisite for access control in the cloud environment. In this paper we discuss an efficient authentication mechanism to deal with the security threats that are faced by cloud. The method proposed in this paper prevents the confidential data and information of end users stored in a private cloud from unauthorized access by using a two-factor authentication involving shared image concept in addition with encrypted key authentication.MD5 hashing technique is used which takes binary pixel value of image as input and convert it into a 128-bit hash value. The overall process of authentication has been shown through experimental result and implementation which shows a series of snapshots taken from the chapter.


Sign in / Sign up

Export Citation Format

Share Document