UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 13 | Issue 3 | March 2026

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 4
April-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1904635


Registration ID:
203556

Page Number

183-185

Share This Article


Jetir RMS

Title

Data Leakage Detection of Guilty Agents and Security Strategies using Encryption Algorithm and MAC Address

Abstract

There are a unit of several websites that publish data and supply access of knowledge on the network. All that internet sites has many alternative web application programs that contains potential data or knowledge that got to be protected. In many organizations, business scenarios and company outsource its data to the other company or organization or agents, all these agents are known as trusted third party agents. The knowledge owner provides the confidential knowledge to the sure third party agents and their risk that any of that sure agent will leak the potential data. It is obligatory to notice the guilty agent, who leaks the data to unauthorized agents. For identification of leaked data in existing system uses watermarking technique and data allocation strategies with adding fake objects. However, it has deficiency is that watermarking data can be modified or change. In projected system uses AES algorithmic rule for coding of requested knowledge. As a result, unauthorized party is unable to view or access the confidential data. One more technique used for up probabilities of police work guilty agent is raincoat (Media Access Control) address.

Key Words

IndexTerms –AES algorithm, Guilty Agent, Watermarking.

Cite This Article

" Data Leakage Detection of Guilty Agents and Security Strategies using Encryption Algorithm and MAC Address", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 4, page no.183-185, April-2019, Available :http://www.jetir.org/papers/JETIR1904635.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

" Data Leakage Detection of Guilty Agents and Security Strategies using Encryption Algorithm and MAC Address", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 4, page no. pp183-185, April-2019, Available at : http://www.jetir.org/papers/JETIR1904635.pdf

Publication Details

Published Paper ID: JETIR1904635
Registration ID: 203556
Published In: Volume 6 | Issue 4 | Year April-2019
DOI (Digital Object Identifier):
Page No: 183-185
Country: new delhi, delhi, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002978

Print This Page

Current Call For Paper

Jetir RMS