Android Text Encryption Using Various Algorithms

Mobile Computing, Security and Encryption, Web Application
" Name Android Text Encryption Using Various Algorithms Technology Android Category Mobile Computing Description Users communicate over all social media, but messages are not secured when it passes through network. Intruder can access user’s message easily. We want to secure users communication over all social media. So here we proposed a system where user will enter the plain text and select the algorithm type from AES,DES,MD5,….. and provide the key, a chipper text will be formed that can be sent via any communication application and end user can decrypt the text by selecting the same algorithm type and must enter the same sender secret key. User can use our application and can enter the plain text and must select the algorithm type and must enter the secret key to encrypt…
Read More

Graphical Password By Image Segmentation

Image Processing, Parallel And Distributed System, Security and Encryption, Web Application
Name Graphical Password By Image Segmentation Technology DotNET,MS SQL Category Web Application Description The project allows user to input an image as its password and only user knows what the image looks like as a whole. On receiving the image the system segments the image into an array of images and stores them accordingly. The next time user logs on to the system the segmented image is received by the system in a jumbled order. Now if user chooses the parts of image in an order so as to make the original image he sent then user is considered authentic. Else the user is not granted access. The system uses image segmentation based on coordinates. The coordinates of the segmented image allow the system to fragment the image and store…
Read More

Credit Card Fraud Detection

Cloud Computing, Security and Encryption, Web Application
Name Credit Card Fraud Detection Technology DotNET,MS SQL Category Web Application Description The credit card fraud detection features uses user behavior and location scanning to check for unusual patterns. These patterns include user characteristics such as user spending patterns as well as usual user geographic locations to verify his identity. If any unusual pattern is detected, the system requires revivification. The system analyses user credit card data for various characteristics. These characteristics include user country, usual spending procedures. Based upon previous data of that user the system recognizes unusual patterns in the payment procedure. So now the system may require the user to login again or even block the user for more than 3 invalid attempts. IEEE Paper Yes IEEE Paper Year 2015
Read More

Active Chat Monitoring and Suspicious Chat Detection over Internet

Data mining, Security and Encryption, Web Application
Name Active Chat Monitoring and Suspicious Chat Detection over Internet Technology DotNET,MS SQL Category Web Application Description A lot of terrorist activities and groups communicate over apps and chat programs over the internet. They also use these chat application over the internet for getting their message to young generation and making new terrorists. Well we here propose a internet chat application that actively monitors various chats going on and also alerts the admin about any suspicious chat process taking place. The system is built to process all chats taking place over and saving them with history. The chat process is handled by server. As data passes through server it continuously scans it for any suspicious keywords. The admin may however keep a watch at any chat he desires. A special…
Read More

Secure Remote Communication Using DES Algorithm

Networking, Security and Encryption, Web Application
Name Secure Remote Communication Using DES Algorithm Technology DotNET,MS SQL Category Web Application Description The Data Encryption Standard (DES) algorithm is a widely accepted system for data encryption that makes use of a private (secret) key that was judged so hard to break by the U.s. government that it was confined for exportation to different nations. There are more than 71,000,000,000,000,000 (71 quadrillion) encryption keys to be used in this algorithm. For any given message, the key is picked at irregular interval from among this colossal number of keys. Like other private key cryptographic routines, both the sender and the collector must know and utilize a common private key. Many companies, governments, military and other fields make use of DES algorithm for secure data transfer over unsecure networks. We here…
Read More

Fake Product Review Monitoring And Removal For Genuine Online Product Reviews Using Opinion Mining

Data mining, Multimedia, Networking, Security and Encryption, Web Application
Name Fake Product Review Monitoring And Removal For Genuine Online Product Reviews Using Opinion Mining Technology DotNET,MS SQL Category Web Application Description As most of the people require review about a product before spending their money on the product. So people come across various reviews in the website but these reviews are genuine or fake is not identified by the user. In some review websites some good reviews are added by the product company people itself in order to make in order to produce false positive product reviews. They give good reviews for many different products manufactured by their own firm. User will not be able to find out whether the review is genuine or fake. To find out fake review in the website this “Fake Product Review Monitoring and…
Read More

Monitoring Suspicious Discussions On Online Forums Using Data Mining

Data mining, Networking, Security and Encryption, Web Application
Name Monitoring Suspicious Discussions On Online Forums Using Data Mining Technology DotNET,MS SQL Category Web Application Description People now-a-days are very fond of using internet as a discussion medium. As internet technology had been increasing more and more, this technology led to many legal and illegal activities. It is found that much first-hand news has been discussed in Internet forums well before they are reported in traditional mass media. This communication channel provides an effective channel for illegal activities such as dissemination of copyrighted movies, threatening messages and online gambling etc. The law enforcement agencies are looking for solutions to monitor these discussion forums for possible criminal activities and download suspected postings as evidence for investigation. We propose a system which will tackle this problem effectively. In this project we…
Read More

Railway Tracking and Arrival Time Prediction

Mobile Computing, Multimedia, Networking, Security and Encryption, Web Application
Name Railway Tracking and Arrival Time Prediction Technology DotNET,MS SQL Category Web Application Description It has happened so many times that you have been waiting on railway station for someone to arrive and you don’t have any exact information about train timing and other stuff. So here we present to you a project on Railway Tracking and Arrival Time Prediction. Using this system user’s can get the information about train timing, and is it on time or not, and other information. In this, system will track the train timing at what time train departed from a particular station and pass these timing details to other station’s system where it will display the timing according to train departed from previous station. If system will find any delay in train due to…
Read More

Detecting E Banking Phishing Websites Using Associative Classification

Data mining, Multimedia, Networking, Security and Encryption, Web Application
Name Detecting E Banking Phishing Websites Using Associative Classification Technology DotNET,MS SQL Category Web Application Description There are number of users who purchase products online and make payment through e- banking. There are e- banking websites who ask user to provide sensitive data such as username, password or credit card details etc often for malicious reasons. This type of e-banking websites is known as phishing website. In order to detect and predict e-banking phishing website. We proposed an intelligent, flexible and effective system that is based on using classification Data mining algorithm. We implemented classification algorithm and techniques to extract the phishing data sets criteria to classify their legitimacy. The e-banking phishing website can be detected based on some important characteristics like URL and Domain Identity, and security and encryption…
Read More

Image Steganography With 3 Way Encryption

Cloud Computing, Parallel And Distributed System, Security and Encryption, Web Application
Name Image Steganography With 3 Way Encryption Technology DotNET,MS SQL Category Web Application Description Steganography is the technique of hiding private or sensitive information within something that appears to be nothing be a usual image. Steganography involves hiding Text so it appears that to be a normal image or other file. If a person views that object which has hidden information inside, he or she will have no idea that there is any secret information. What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message inside an image file, user uploads the image and enters the text to send secretly, and gives a…
Read More

Graphical Password To Avoid Shoulder Surfing

Multimedia, Security and Encryption, Web Application
Name Graphical Password To Avoid Shoulder Surfing Technology DotNET,MS SQL Category Web Application Description Since conventional password schemes are vulnerable to shoulder surfing, many shoulder surfing resistant graphical password schemes have been proposed. However, as most users are more familiar with textual passwords than pure graphical passwords, text-based graphical password schemes have been proposed. Unfortunately, none of existing text-based shoulder surfing resistant graphical password schemes is both secure and efficient enough. In this paper, we propose an improved text-based shoulder surfing resistant graphical password scheme by using colours. In the proposed scheme, the user can easily and efficiently login system. Next, we analyze the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder surfing and accidental login. The shoulder surfing attack in…
Read More

Implementing Triple DES With OTP

Parallel And Distributed System, Security and Encryption, Web Application
Name Implementing Triple DES With OTP Technology DotNET,MS SQL Category Web Application Description Triple DES is advantageous because it has a significantly sized key length, which is longer than most key lengths affiliated with other encryption modes. It derives from single DES but the technique is used in triplicate and involves three sub keys and key padding when necessary, such as instances where the keys must be increased to 64 bits in length. Known for its compatibility and flexibility, software can easily be converted for Triple DES inclusion. Triple DES encrypts input data three times. The three keys are referred to as k1, k2 and k3. Thus due to the use of 3 key ,triple DES is more secure and is sometimes preferred over the normal DES. The system combines…
Read More

Secure File Storage On Cloud Using Hybrid Cryptography

Cloud Computing, Networking, Parallel And Distributed System, Security and Encryption, Web Application
Name Secure File Storage On Cloud Using Hybrid Cryptography Technology DotNET,MS SQL Category Web Application Description The proposed software product is liable to meet the required security needs of data center of cloud. Blowfish used for the encryption of file slices takes minimum time and has maximum throughput for encryption and decryption from other symmetric algorithms. The idea of splitting and merging adds on to meet the principle of data security. The hybrid approach when deployed in cloud environment makes the remote server more secure and thus, helps the cloud providers to fetch more trust of their users. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data and access control is fulfilled. Cryptography technique translates original data into unreadable form. Cryptography technique is divided…
Read More

Card Payment Security Using RSA

Cloud Computing, Parallel And Distributed System, Security and Encryption, Web Application
Name Card Payment Security Using RSA Technology DotNET,MS SQL Category Web Application Description Due to increasing e-commerce activity nowadays, there is a need for some encryption technique to ensure security and a way to ensure that the user’s data are securely stored in the database. Thus the system introduces RSA for this purpose. The RSA algorithm is a kind of asymmetric encryption algorithm which appeared in 1978. The algorithm is public key encryption algorithm which is a widely accepted and implemented by public. The use of RSA in this the system makes the process more secure. Now the bank transactions can be done securely without worrying about attacker getting access to the database as the data will be in encrypted form. IEEE Paper Yes IEEE Paper Year 2015
Read More

Preventing Phishing Attack On Voting System Using Visual Cryptography

Cloud Computing, Multimedia, Parallel And Distributed System, Security and Encryption, Web Application
Name Preventing Phishing Attack On Voting System Using Visual Cryptography Technology DotNET,MS SQL Category Web Application Description Voting system Using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place. The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if he logs into the system by entering the correct password which is generated by merging the two shares using VC scheme. Administrator sends share 1 to voter e-mail id before election and share 2 will be available in the voting system for his login during election. Voter will get the secret password to cast his…
Read More

Detecting Phishing Websites Using Machine Learning

Cloud Computing, Data mining, Parallel And Distributed System, Security and Encryption, Web Application
Name Detecting Phishing Websites Using Machine Learning Technology DotNET,MS SQL Category Web Application Description There are number of users who purchase products online and make payment through various websites.There are multiple websites who ask user to provide sensitive data such as username, password or credit card details etc. often for malicious reasons. This type of websites is known as phishing website. In order to detect and predict phishing website, we proposed an intelligent, flexible and effective system that is based on using classification Data mining algorithm. We implemented classification algorithm and techniques to extract the phishing data sets criteria to classify their legitimacy. The phishing website can be detected based on some important characteristics like URL and Domain Identity, and security and encryption criteria in the final phishing detection rate.…
Read More

E Authentication System Using QR Code & OTP

Cloud Computing, Data mining, Networking, Parallel And Distributed System, Security and Encryption, Web Application
Name E Authentication System Using QR Code & OTP Technology DotNET,MS SQL Category Web Application Description In the proposed scheme, the user can easily and efficiently login into the system. We analyze the security and usability of the proposed scheme, and show the resistance of the proposed scheme to hacking of login credentials, shoulder surfing and accidental login. The shoulder surfing attack can be performed by the adversary to obtain the user’s password by watching over the user’s shoulder as he enters his password. Since, we have come up with a secure system schemes with different degrees of resistance to shoulder surfing have been proposed. In order to use this authentication system, user need to first register himself into this system by filing up the basic registration details. After a…
Read More

Image Encryption For Secure Internet Transfer

Networking, Parallel And Distributed System, Security and Encryption, Web Application
Name Image Encryption For Secure Internet Transfer Technology MsSql, Dot NET Category Web Application Description Encryption is commonly used for encryption of text as well as images. Various encryption algorithms exist for this purpose. Here we propose to build a secured image encryption algorithm that can be used to encrypt as well as send images remotely to the intended receiver. Our system can link to remote client to our software installed on remote system and connect to it for image transfer. Our system uses RSA algorithm for this purpose. User may submit his image for encryption. Our system now gets the image and converts it into hex format before being encrypted. Then we use RSA algorithm to encrypt the image for sending through the internet. User may now select the…
Read More

Secure Data Transfer Over Internet Using Image Steganography

Cloud Computing, Networking, Parallel And Distributed System, Security and Encryption, Web Application
Name Secure Data Transfer Over Internet Using Image Steganography Technology MsSql, Dot NET Category Web Application Description Steganography is the technique of hiding private or sensitive information within something that appears to be nothing be a usual image. Steganography involves hiding Text so it appears that to be a normal image or other file. If a person views that object which has hidden information inside, he or she will have no idea that there is any secrete information. What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message inside an image file, user uploads the image and enters the text to send secretly,…
Read More

Sending a secure message over a network to a remote site

Parallel And Distributed System, Security and Encryption, Web Application
Name Sending a secure message over a network to a remote site Technology MsSql, Dot NET Category Web Application Description We here use a system to securely transfer a message encrypted using Aes algorithm to a remote site so that only proper authentication at remote site can decrypt the message. The system also uses acknowledgements to signal the message integrity and delivery over the network. The system consists of two terminal applications running concurrently over two different PC’s. User may first use the sending tab to send a secure message. On using this function the accepts user string and key to encrypt it. The system then receives this message and encrypts it using AES algorithm. Now the system transfers this message to remote site using over a Tcp/ip internet connection.…
Read More

Improved Data Leakage Detection

Parallel And Distributed System, Security and Encryption, Web Application
Name Improved Data Leakage Detection Technology MsSql, Dot NET Category Web Application Description Data leakage detection techniques are built for users to track if data has been leaked and the trace the sources of data leakage. Many times we come across cases where leaked data is found at unauthorized places. For example we may find sensitive data stored on an unauthorized laptop or website. At such a time it becomes important to trace the source of data leakage. For this purpose we propose an improved data leakage detection technique to trace back sources of unauthorized leakage by using a strategy of data allocation across various agents. The strategy allows user to transfer data to users by considering receivers as agents who are allocated data along with some id based undetectable…
Read More

Secure Electronic Fund Transfer Over Internet Using DES

Networking, Parallel And Distributed System, Security and Encryption, Web Application
Name Secure Electronic Fund Transfer Over Internet Using DES Technology MsSql, Dot NET Category Web Application Description Nowadays people often need to transfer cash from one account to another. In such cases they need to go to bank or search for PC connected to internet to get access to the services offered by internet banking for reliable fund transfer. This system proves to be really beneficial in such cases. As with the help of this system the user just needs to enter the account details. For security, DES algorithm is used along with instant verification and consistency check algorithm. All these are performed for secure electronic fund transfer. Thus a user just needs to visit any EFT center, in order to make the payment. The transfer is done instantly using…
Read More

Unique User Identification Across Multiple Social Networks

Multimedia, Security and Encryption, Web Application
Name Unique User Identification Across Multiple Social Networks Technology MsSql, Dot NET Category Web Application Description There are number of social network sites that connect a large amount of people around the world. All social networking sites differ from each other based on various components such as Graphical User Interface, functionality, features etc. Many users have virtual identities on various social network sites. It is common that people are users of more than one social network and also their friends may be registered on multiple social network sites. User may login to different social networking sites at different timing, so user may not find his friends online when he logins to the particular social networking website. To overcome this issue our proposed system will bring together our online friends on…
Read More

A New Hybrid Technique For Data Encryption

Networking, Security and Encryption, Web Application
Name A New Hybrid Technique For Data Encryption Technology MsSql, Dot NET Category Web Application Description Data encryption has been widely applied in many data processing areas. Various encryption algorithms have been developed for processing text documents, images, video, etc. If we are able to collaborate the advantages of the different existing encryption methods, then a new hybrid encryption method can be developed which offers better security and protection. So, in order to accomplish the Hybrid encryption technique, data encryption techniques using Fibonacci series, XOR logic, PN sequence are studied, analyzed and their performance is compared in this paper. The message is divided into three parts and these three different techniques are applied to these parts and the performance is again analyzed. The application of these three different methods to…
Read More

High Security Encryption Using AES & Visual Cryptography

Multimedia, Networking, Security and Encryption, Web Application
Name High Security Encryption Using AES & Visual Cryptography Technology MsSql, Dot NET Category Web Application Description A novel and highly secure encryption methodology using a combination of AES and visual crypto. With the ever increasing human dependency on The Internet for performing various activities such as banking, shopping or transferring money, there equally exists a need for safe and secure transactions. This need a system that automatically translates to the requirement of increased network security and better and fast encryption algorithms. This system addresses the above issue by introducing a novel methodology by utilizing the AES method of encryption and also further enhances the same with the help of visual cryptography. In this method the secret message is divided into two parts after which the message the first half…
Read More

Data Duplication Removal Using File Checksum

Multimedia, Parallel And Distributed System, Security and Encryption, Web Application
Name Data Duplication Removal Using File Checksum Technology MsSql, Dot NET Category Web Application Description Data duplication technology usually identifies redundant data quickly and correctly by using file checksum technique. A checksum can determine whether there is redundant data. However, there are the presences of false positives. In order to avoid false positives, we need to compare a new chunk with chunks of data that have been stored. In order to reduce the time to exclude the false positives, current research uses extraction of file data checksum. However, the target file stores multiple attributes such as user id, filename, size, extension, checksum and date-time table. Whenever user uploads a particular file, the system then first calculates the checksum and that checksum is cross verified with the checksum data stored in…
Read More

Encryption & Decryption Using Deffie Hellman Algorithm

Multimedia, Security and Encryption, Web Application
Name Encryption & Decryption Using Deffie Hellman Algorithm Technology MsSql, Dot NET Category Web Application Description The spectacular growth of the Internet has spawned an increased awareness of and interest in security issues. Although security has been considered in the design of the basic Internet protocols, many applications have been and are being designed with minimal attention paid to issues of confidentiality, authentication, and privacy. As our daily activities become more and more reliant upon data networks, the importance of an understanding of such security issues will only increase. Many cryptographic algorithms (e.g., DES, AES) require the establishment of shared keying material in advance. Manual distribution of keying material is inefficient and complex. This is where the Diffie-Hellman Key Agreement algorithm is useful. The project is developed using Visual Studio…
Read More

Data Standardization Using Hidden Markov Model

Security and Encryption, Web Application
Name Data Standardization Using Hidden Markov Model Technology MsSql, Dot NET Category Web Application Description Record linkage refers to the process of joining records that relate to the same entity or event in one or more data collections. In the absence of a shared, unique key, record linkage involves the comparison of ensembles of partially-identifying, non-unique data items between pairs of records. Data items with variable formats, such as names and addresses, need to be transformed and normalized in order to validly carry out these comparisons. Traditionally, deterministic rule-based data processing systems have been used to carry out this pre-processing, which is commonly referred to as “standardization”. This project describes an alternative approach to standardization, using a combination of lexicon-based tokenization and probabilistic Hidden Markov Models (HMMs). The project is…
Read More

Secure Electronic Fund Transfer Over Internet Using DES

Security and Encryption, Web Application
Name Secure Electronic Fund Transfer Over Internet Using DES Technology PHP,MySql Category Web Application Description Nowadays people often need to transfer cash from one account to another. In such cases they need to go to bank or search for PC connected to internet to get access to the services offered by internet banking for reliable fund transfer. This system proves to be really beneficial in such cases. As with the help of this system the user just needs to enter the account details. For security, DES algorithm is used along with instant verification and consistency check algorithm. All these are performed for secure electronic fund transfer. Thus, a user just needs to visit any EFT center, in order to make the payment.The transfer is done instantly using a single portable…
Read More

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

Cloud Computing, Networking, Security and Encryption, Web Application
Name Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Technology Dot net, MS SQL Category Cloud Computing,Security,Networking Description Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to…
Read More

Product Aspect Ranking and Its Applications

Cloud Computing, Data mining, Security and Encryption, Web Application
Name Product Aspect Ranking and Its Applications Technology Dot net, MS SQL Category Cloud Computing,Security,Data Mining Description Numerous consumer reviews of products are now available on the Internet. Consumer reviews contain rich and valuable knowledge for both firms and users. However, the reviews are often disorganized, leading to difficulties in information navigation and knowledge acquisition. This article proposes a product aspect ranking framework, which automatically identifies the important aspects of products from online consumer reviews, aiming at improving the usability of the numerous reviews. The important product aspects are identified based on two observations: 1) the important aspects are usually commented on by a large number of consumers and 2) consumer opinions on the important aspects greatly influence their overall opinions on the product. In particular, given the consumer reviews…
Read More

Typicality-Based Collaborative Filtering Recommendation

Cloud Computing, Data mining, Security and Encryption
Name Typicality-Based Collaborative Filtering Recommendation Technology Dot net, MS SQL Category Cloud Computing,Security,Data Mining Description Collaborative filtering (CF) is an important and popular technology for recommender systems. However, current CF methods suffer from such problems as data sparsity, recommendation inaccuracy, and big-error in predictions. In this paper, we borrow ideas of object typicality from cognitive psychology and propose a novel typicality-based collaborative filtering recommendation method named TyCo. A distinct feature of typicality-based CF is that it finds “neighbors” of users based on user typicality degrees in user groups (instead of the corated items of users, or common users of items, as in traditional CF). To the best of our knowledge, there has been no prior work on investigating CF recommendation by combining object typicality. TyCo outperforms many CF recommendation methods…
Read More

A Location- and Diversity-aware News Feed System for Mobile Users

Mobile Computing, Security and Encryption
Name A Location- and Diversity-aware News Feed System for Mobile Users Technology Dot net, MS SQL Category Mobile Computing,Security Description A location-aware news feed system enables mobile users to share geo-tagged user-generated messages, e.g., a user can receive nearby messages that are the most relevant to her. In this paper, we present MobiFeed that is a framework designed for scheduling news feeds for mobile users. MobiFeed consists of three key functions, location prediction, relevance measure, and news feed scheduler. The location prediction function is designed to predict a mobile user’s locations based on an existing path prediction algorithm. The relevance measure function is implemented by combining the vector space model with non-spatial and spatial factors to determine the relevance of a message to a user. The news feed scheduler works…
Read More

Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search

Security and Encryption
Name Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search Technology Dot net, MS SQL Category Security Description Existing semantically secure public-key searchable encryption schemes take search time linear with the total number of the ciphertexts. This makes retrieval from large-scale databases prohibitive. To alleviate this problem, this paper proposes Searchable Public-Key Ciphertexts with Hidden Structures (SPCHS) for keyword search as fast as possible without sacrificing semantic security of the encrypted keywords. In SPCHS, all keyword-searchable ciphertexts are structured by hidden relations, and with the search trapdoor corresponding to a keyword, the minimum information of the relations is disclosed to a search algorithm as the guidance to find all matching ciphertexts efficiently. We construct a SPCHS scheme from scratch in which the ciphertexts have a hidden star-like structure.…
Read More

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Cloud Computing, Data mining, Parallel And Distributed System, Security and Encryption, Web Application
With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the large size of shared data in the cloud. In this paper, we propose…
Read More

Slicing A New Approach to Privacy Preserving Data Publishing.

Data mining, Security and Encryption
Name Slicing A New Approach to Privacy Preserving Data Publishing. Technology Java Category Security & Data Mining Description Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving microdata publishing. Recent work has shown that general- ization loses considerable amount of information, especially for high-dimensional data. Bucketization, on the other hand, does not prevent membership disclosure and does not apply for data that do not have a clear separation between quasi- identifying attributes and sensitive attributes. IEEE Paper Yes IEEE Paper Year 2013 Contact Form [contact-form-7 id="71" title="Contact form 1"]
Read More

Data leakage Detection

Security and Encryption
Name Data leakage Detection Technology .net Category Security Description While doing business, sometimes sensitive data must be handed over to supposedly trusted third parties. For example, a hospital may give patient records to researchers who will devise new treatments. Similarly, a company may have partnerships with other companies that require sharing customer data. Another enterprise may outsource its data processing, so data must be given to various other companies. We call the owner of the data the distributor and the supposedly trusted third parties the agents. Our goal is to detect when the distributor’s sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data. We consider applications where the original sensitive data cannot be perturbed. Perturbation is a very useful technique where…
Read More