M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016
Avoidance of Sensitive Data Exposure in Intramail System Using MD5 Algorithm
Jissmol T Antony, Gopal B
During the last few years the number of leaked sensitive data records in email system has increased dramatically). Among various data-leak cases human mistakes are one of the main causes of data loss in mail system. The existing technique is to avoid data-leak is monitor the content in storage and before transmission which is not proficient to provide protection to sensitive data and it is not capable to avoid the sensitive data leak in email system. The proposed method adds a double layer security to the sensitive data in intra mail system using the session password and comparison of the document with sensitive data repository. The amount of sensitive data in the document is verified by comparing the message digest of sensitive words in the document with the sensitive data repository where the sensitive s message digest is already stored for the purpose of the comparison using MD5 algorithm. Once the comparison is complete, with the help of Term frequency process the system measures how frequently a sensitive term occurs in the selected document and produces the result.
Keywords: Intramail system, Pair based matrix, MD5 Algorithm, Term frequency-Inverse document frequency, Session Password
Edition: Volume 5 Issue 6, June 2016
Pages: 632 - 634
How to Cite this Article?
Jissmol T Antony, Gopal B, "Avoidance of Sensitive Data Exposure in Intramail System Using MD5 Algorithm", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV164090, Volume 5 Issue 6, June 2016, 632 - 634
130 PDF Views | 109 PDF Downloads
Similar Articles with Keyword 'MD5 Algorithm'
Improving Security for Digital Signature by Using Steganography
G. Pranitha, Ch. Suman Chakravarthy
Detection and Prevention of Cooperative Wormhole Attack in a MANET
Anuradha T, Padmashree S. Shedbalkar
An Efficient Privacy Preserving Scheme over Encrypted Data in Cloud
Kirti Panmand, Sandeep Kadam
A Secure End-To-End Protocol for Secure Transmission of SMS
Vaidehi V. Mantri, M. Y. Joshi
Key Aggregate Method for Secure Data Sharing in Cloud Storage Using MD5
Varsha S. Kadam, R. H. Kulkarni