About this Journal  |  Author Guidelines  |   Submit a Manuscript     

International Journal of IT Business Strategy Management

Volume 3, No. 1, 2017, pp 1-6
http://dx.doi.org/10.21742/ijibsm.2017.3.1.01

Abstract



Data Structure in Miscillinious Environments



    B Susmitha Reddy
    100-100 Department of Computer Science and Engineering,
    KL University, Vaddeswaram, Guntur

    Abstract

    Intentional or unintentional escape of confidential knowledge is doubtless one among the foremost severe security threats that organizations face within the digital era. The threat currently extends to our personal lives: an overplus of private data is offered to social networks and good phone suppliers and is indirectly transferred to undependable third party and fourth party applications. During this work, we tend to gift a generic knowledge lineage framework LIME for knowledge flow across multiple entities that take 2 characteristics, principal roles (i.e., owner and consumer). We tend to outline the precise security guarantees needed by such a knowledge lineage mechanism toward identification of a guilty entity, and establish the simplifying non-repudiation and honesty assumptions. We tend to then develop and analyze a unique responsible knowledge transfer protocol between 2 entities among a malicious atmosphere by building upon oblivious transfer, sturdy watermarking, and signature primitives. Finally, we tend to perform AN experimental analysis to demonstrate the usefulness of our protocol and apply our framework to the necessary knowledge escape eventualities of knowledge outsourcing and social networks. In general, we tend to think about LIME, our lineage framework for knowledge transfer, to be a key step towards achieving responsibility designedly.


 

Contact Us

  • PO Box 5074, Sandy Bay Tasmania 7005, Australia
  • Phone: +61 3 9028 5994