Information Leak Detection and Prevention
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 120 , Downloads: 110 | CTR: 92 % | Weekly Popularity: ⮙6

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015

Information Leak Detection and Prevention

Deepika. S. Patil, Dr. Sujata Terdal

Information leakage is one of the major challenges in end to end data exchange through Open Source light weight services like MQTT and Redis. These brokers are important part of information sharing in VPN and fog computing. Generally such brokers do not offer session management, access control and data security. The goal of this work is to extend the capabilities of such information brokers by implementing security layer on top of data service to prevent information leakage. This particular work consider Redis broker as a test case and offers security layer to prevent information leakage through Redis broker. We also design a UI system to demonstrate the capabilities of the system with and without the security. Our results shows that adding the security extension does not increase the overhead by much in terms of system resources and latency. We also extend the key-value based system to be able to store binary image data which is also stored in the encrypted pattern.

Keywords: Redis, visual studio, Authentication Service, Encryption to Value data, Security to persistent data one that is stored permanently, Security to blob data multimedia data for images

Edition: Volume 4 Issue 9, September 2015

Pages: 1079 - 1082

Share this Article

How to Cite this Article?

Deepika. S. Patil, Dr. Sujata Terdal, "Information Leak Detection and Prevention", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB158211, Volume 4 Issue 9, September 2015, 1079 - 1082

120 PDF Views | 110 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Redis'

Views: 124 , Downloads: 95 | CTR: 77 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1690 - 1694

Analytics of Application Resource Utilization within the Virtual Machine

Priyanka H

Share this Article

Views: 134 , Downloads: 99 | CTR: 74 %

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2067 - 2070

A Survey on QOS Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud Environment

Swati Nagpure

Share this Article

Views: 156 , Downloads: 109 | CTR: 70 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1876 - 1882

Ensuring QoS-Guaranteed Bandwidth Shifting and Redistribution using Mobile Cloud Environment

Dr. K. Suresh Babu, Gardas Pavani

Share this Article

Views: 134 , Downloads: 110 | CTR: 82 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2611 - 2615

QoS Ensured Bandwidth Allocation in Mobile Cloud Computing

Mahesh D.S, Shalini Pawar

Share this Article

Views: 120 , Downloads: 110 | CTR: 92 % | Weekly Popularity: ⮙6

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1079 - 1082

Information Leak Detection and Prevention

Deepika. S. Patil, Dr. Sujata Terdal

Share this Article

Similar Articles with Keyword 'visual studio'

Views: 129 , Downloads: 109 | CTR: 84 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 869 - 874

Fault Tolerance for Adaptive Replication in Grid Using Fused Data Structures

J. Vengadasubramanikandan

Share this Article

Views: 129 , Downloads: 109 | CTR: 84 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2333 - 2336

Fault Tolerance in Parallel System Using Multiple Stacks

K. Meera, Prof. S. Abiramasundari

Share this Article

Views: 120 , Downloads: 110 | CTR: 92 % | Weekly Popularity: ⮙6

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1079 - 1082

Information Leak Detection and Prevention

Deepika. S. Patil, Dr. Sujata Terdal

Share this Article

Views: 132 , Downloads: 121 | CTR: 92 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1424 - 1428

Improving Text Search Process using Text Document Clustering Approach

Ruchika Mavis Daniel, Arun Kumar Shukla

Share this Article

Views: 164 , Downloads: 135 | CTR: 82 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, Malaysia, Volume 2 Issue 2, February 2013

Pages: 477 - 486

Online Student Supervision Management System (OSSMS)

Mohammed Najah Mahdi, Abdul Rahim Ahmad, Roslan Ismail, Sherna Aziz

Share this Article

Similar Articles with Keyword 'Authentication Service'

Views: 128 , Downloads: 108 | CTR: 84 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2469 - 2472

A Survey of Advance Multi-Factor Authentication and Multi-Keyword Ranked Search for Encrypted Cloud Data

Snehal Rahul Patil, Shiwani Sthapak

Share this Article

Views: 120 , Downloads: 110 | CTR: 92 % | Weekly Popularity: ⮙6

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1079 - 1082

Information Leak Detection and Prevention

Deepika. S. Patil, Dr. Sujata Terdal

Share this Article
Top