International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 121 | Views: 133

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016


Avoidance of Sensitive Data Exposure in Intramail System Using MD5 Algorithm

Jissmol T Antony | Gopal B [4]


Abstract: During the last few years the number of leaked sensitive data records in email system has increased dramatically). Among various data-leak cases human mistakes are one of the main causes of data loss in mail system. The existing technique is to avoid data-leak is monitor the content in storage and before transmission which is not proficient to provide protection to sensitive data and it is not capable to avoid the sensitive data leak in email system. The proposed method adds a double layer security to the sensitive data in intra mail system using the session password and comparison of the document with sensitive data repository. The amount of sensitive data in the document is verified by comparing the message digest of sensitive words in the document with the sensitive data repository where the sensitive s message digest is already stored for the purpose of the comparison using MD5 algorithm. Once the comparison is complete, with the help of Term frequency process the system measures how frequently a sensitive term occurs in the selected document and produces the result.


Keywords: Intramail system, Pair based matrix, MD5 Algorithm, Term frequency-Inverse document frequency, Session Password


Edition: Volume 5 Issue 6, June 2016,


Pages: 632 - 634


How to Download this Article?

Type Your Email Address below to Download the Article PDF


How to Cite this Article?

Jissmol T Antony, Gopal B, "Avoidance of Sensitive Data Exposure in Intramail System Using MD5 Algorithm", International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp. 632-634, https://www.ijsr.net/get_abstract.php?paper_id=NOV164090



Similar Articles with Keyword 'MD5 Algorithm'

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1324 - 1327

Improving Security for Digital Signature by Using Steganography

G. Pranitha [3] | Ch. Suman Chakravarthy

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2302 - 2305

Detection and Prevention of Cooperative Wormhole Attack in a MANET

Anuradha T [2] | Padmashree S. Shedbalkar

Share this Article



Top