Avoidance of Sensitive Data Exposure in Intramail System Using MD5 Algorithm
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016

Avoidance of Sensitive Data Exposure in Intramail System Using MD5 Algorithm

Jissmol T Antony, Gopal B

During the last few years the number of leaked sensitive data records in email system has increased dramatically). Among various data-leak cases human mistakes are one of the main causes of data loss in mail system. The existing technique is to avoid data-leak is monitor the content in storage and before transmission which is not proficient to provide protection to sensitive data and it is not capable to avoid the sensitive data leak in email system. The proposed method adds a double layer security to the sensitive data in intra mail system using the session password and comparison of the document with sensitive data repository. The amount of sensitive data in the document is verified by comparing the message digest of sensitive words in the document with the sensitive data repository where the sensitive s message digest is already stored for the purpose of the comparison using MD5 algorithm. Once the comparison is complete, with the help of Term frequency process the system measures how frequently a sensitive term occurs in the selected document and produces the result.

Keywords: Intramail system, Pair based matrix, MD5 Algorithm, Term frequency-Inverse document frequency, Session Password

Edition: Volume 5 Issue 6, June 2016

Pages: 632 - 634

Share this Article

How to Cite this Article?

Jissmol T Antony, Gopal B, "Avoidance of Sensitive Data Exposure in Intramail System Using MD5 Algorithm", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV164090, Volume 5 Issue 6, June 2016, 632 - 634

130 PDF Views | 109 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'MD5 Algorithm'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1324 - 1327

Improving Security for Digital Signature by Using Steganography

G. Pranitha, Ch. Suman Chakravarthy

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2302 - 2305

Detection and Prevention of Cooperative Wormhole Attack in a MANET

Anuradha T, Padmashree S. Shedbalkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2885 - 2889

An Efficient Privacy Preserving Scheme over Encrypted Data in Cloud

Kirti Panmand, Sandeep Kadam

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 1042 - 1047

A Secure End-To-End Protocol for Secure Transmission of SMS

Vaidehi V. Mantri, M. Y. Joshi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 492 - 495

Key Aggregate Method for Secure Data Sharing in Cloud Storage Using MD5

Varsha S. Kadam, R. H. Kulkarni

Share this Article
Top