Views: 120 , Downloads: 110 | CTR: 92 % | Weekly Popularity: ⮙6
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015
Information Leak Detection and Prevention
Deepika. S. Patil, Dr. Sujata Terdal
Information leakage is one of the major challenges in end to end data exchange through Open Source light weight services like MQTT and Redis. These brokers are important part of information sharing in VPN and fog computing. Generally such brokers do not offer session management, access control and data security. The goal of this work is to extend the capabilities of such information brokers by implementing security layer on top of data service to prevent information leakage. This particular work consider Redis broker as a test case and offers security layer to prevent information leakage through Redis broker. We also design a UI system to demonstrate the capabilities of the system with and without the security. Our results shows that adding the security extension does not increase the overhead by much in terms of system resources and latency. We also extend the key-value based system to be able to store binary image data which is also stored in the encrypted pattern.
Keywords: Redis, visual studio, Authentication Service, Encryption to Value data, Security to persistent data one that is stored permanently, Security to blob data multimedia data for images
Edition: Volume 4 Issue 9, September 2015
Pages: 1079 - 1082
How to Cite this Article?
Deepika. S. Patil, Dr. Sujata Terdal, "Information Leak Detection and Prevention", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB158211, Volume 4 Issue 9, September 2015, 1079 - 1082
120 PDF Views | 110 PDF Downloads
Similar Articles with Keyword 'Redis'
Views: 124 , Downloads: 95 | CTR: 77 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1690 - 1694Analytics of Application Resource Utilization within the Virtual Machine
Priyanka H
Views: 134 , Downloads: 99 | CTR: 74 %
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2067 - 2070A Survey on QOS Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud Environment
Swati Nagpure
Views: 156 , Downloads: 109 | CTR: 70 % | Weekly Popularity: ⮙3
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1876 - 1882Ensuring QoS-Guaranteed Bandwidth Shifting and Redistribution using Mobile Cloud Environment
Dr. K. Suresh Babu, Gardas Pavani
Views: 134 , Downloads: 110 | CTR: 82 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2611 - 2615QoS Ensured Bandwidth Allocation in Mobile Cloud Computing
Mahesh D.S, Shalini Pawar
Views: 120 , Downloads: 110 | CTR: 92 % | Weekly Popularity: ⮙6
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1079 - 1082Information Leak Detection and Prevention
Deepika. S. Patil, Dr. Sujata Terdal
Similar Articles with Keyword 'visual studio'
Views: 129 , Downloads: 109 | CTR: 84 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 869 - 874Fault Tolerance for Adaptive Replication in Grid Using Fused Data Structures
J. Vengadasubramanikandan
Views: 129 , Downloads: 109 | CTR: 84 %
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2333 - 2336Fault Tolerance in Parallel System Using Multiple Stacks
K. Meera, Prof. S. Abiramasundari
Views: 120 , Downloads: 110 | CTR: 92 % | Weekly Popularity: ⮙6
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1079 - 1082Information Leak Detection and Prevention
Deepika. S. Patil, Dr. Sujata Terdal
Views: 132 , Downloads: 121 | CTR: 92 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1424 - 1428Improving Text Search Process using Text Document Clustering Approach
Ruchika Mavis Daniel, Arun Kumar Shukla
Views: 164 , Downloads: 135 | CTR: 82 % | Weekly Popularity: ⮙2
Review Papers, Computer Science & Engineering, Malaysia, Volume 2 Issue 2, February 2013
Pages: 477 - 486Online Student Supervision Management System (OSSMS)
Mohammed Najah Mahdi, Abdul Rahim Ahmad, Roslan Ismail, Sherna Aziz
Similar Articles with Keyword 'Authentication Service'
Views: 128 , Downloads: 108 | CTR: 84 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2469 - 2472A Survey of Advance Multi-Factor Authentication and Multi-Keyword Ranked Search for Encrypted Cloud Data
Snehal Rahul Patil, Shiwani Sthapak
Views: 120 , Downloads: 110 | CTR: 92 % | Weekly Popularity: ⮙6
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1079 - 1082Information Leak Detection and Prevention
Deepika. S. Patil, Dr. Sujata Terdal