Detection of Transformed Data Leaks using Enhanced Encryption Algorithm

  • Ms. Nisha Balani, Dr. Pradnya Borkar, Ms. Moina Parveen
Keywords: NO KEYWORDS

Abstract

Leaking sensitive information into computer systems poses a serious threat to the security of the organization. Statistics show that the lack of proper encryption and communication due to human error is one of the leading causes of data loss. Organizations need tools to identify sensitive data exposure by testing content and storage, that is, to obtain sensitive information that is stored or sent to a specific location. However, finding disclosure of sensitive information is a challenge due to data conversion of content. Modifications (such as installation and removal) lead to unexpected leakage patterns. In this paper, the secure algorithm with double encryption key authentication is used to obtain leaky asymmetric cryptography data, facilitating a guaranteed correlation between the public key (the public part of the asymmetric key pair) and the identity (and / or other attributes) of the corresponding private key holder (private part of that couple), for uses such as verifying the identity of a particular business, verifying the authenticity of information, supporting rejection, and establishing an encrypted communication section

Published
2021-07-07
How to Cite
Ms. Moina Parveen, M. N. B. D. P. B. (2021). Detection of Transformed Data Leaks using Enhanced Encryption Algorithm. Design Engineering, 1088-1092. Retrieved from http://www.thedesignengineering.com/index.php/DE/article/view/2548
Section
Articles