Lime-A Generic Data Lineage Framework In Malicious Environment

P. Swathi, V. Janaki

Abstract


Deliberate or unexpected spillage of secret information is without a doubt a standout amongst the most extreme security dangers that associations look in the advanced period. The danger now reaches out to our own lives: a plenty of individual data is accessible to interpersonal organizations and cell phone suppliers and is in a roundabout way exchanged to dishonest outsider and fourth gathering applications. In this work, we introduce a bland information genealogy system LIME for information stream over numerous elements that take two trademark, key parts (i.e., proprietor and purchaser). We characterize the correct security ensures required by such an information heredity component toward distinguishing proof of a blameworthy substance, and recognize the disentangling non-disavowal and genuineness suppositions. We at that point create and break down a novel responsible information exchange convention between two elements inside a malevolent domain by expanding upon careless exchange, powerful watermarking, and mark primitives. At long last, we play out an exploratory assessment to exhibit the reasonableness of our convention and apply our system to the vital information spillage situations of information outsourcing and interpersonal organizations. By and large, we consider LIME , our genealogy structure for information exchange, to be a key advance towards accomplishing responsibility by plan.


Full Text:

PDF




Copyright (c) 2017 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org