Ijctt v7p145

Page 1

International Journal of Computer Trends and Technology (IJCTT) – volume 7 number 3– Jan 2014

Data Flow for Effective Data Leakage Prevention using Elliptic Curve Digital Signature Algorithm Tony Thomas 1, V.Balajishanmugam 2 1

PG scholar, Computer Science and Engineering, United Institute of Technology, Tamil Nadu, India, 2Assistant Professor, Computer science and Engineering, United Institute of Technology, Tamil nadu, India

Abstract: Sensitive data is leaked in software firm, government sectors and also from the web. To prevent this leakage, data allocation strategies are used. Data allocation Strategy improves the probability of identifying leakages. The current model in leakage detection is handled by watermarking. Watermarks can be useful in some of the cases, but it again, modifies of the original data. If the recipient is malicious watermarks can be destroyed. After giving a set of data to agents, the distributor saw some of the same data in an unauthorized place. At this point the distributor came to know that the data is leaked and came from one or more agents. If the distributor got the enough evidence that an agent leaked data, he may initiate legal proceedings. The data allocation techniques are used to identify the leaking agent. The “guilt model” is used to find the probability of leaking agent. The ECDSA algorithm is used to prevent the data from untrusted party. The Algorithm used is Sample data request and explicit data request. By implementing guilt model and ECDSA techniques the distributor can identify the leaking agents and to whom the data leaks.

and the most important way the data was leaking from the organization is from email and from the web the protection of data is one of the most important task faced by any kind of business. We introduced data allocation for allocation data to agents and the ECDSA algorithm is used to prevent from untrusted party. The rest of this paper is organized as follows. Section II gives a brief background on related work. Section III describes the Digital signature algorithm. Section IV introduces our proposed work. Section V discusses the experiments and results. Finally, Section VI concludes the paper.

Index Terms: Data allocation, Data leakage, ECDSA, Leakage model, security. 1. INTRODUCTION Security is the most crucial part in the world. Many of the data are leaked and that data is found in the hands of untrusted party. The leakage of data is mainly affected by the organization. If the trusted party leaks the data and if the owner of the company have enough evidence he can take legal action. The data leaking areas are three possible ways they are  Inside the organization  Outside the organization and  Third party location. Inside the organization data were leaked by the employees itself and the outside the organization the authorized person stolen the laptop. The third leaking areas is that from trusted party. The data can be stolen in many ways

2. BACKGROUND AND RELATED WORK Research in security has recently gained much attention due to the popularity of networks and the potential

ISSN: 2231-2803 Available online @ http://www.ijesat.org

http://www.ijcttjournal.org

Page160 160


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.