(18.118.24.128)
Users online: 16891     
Ijournet
Email id
 

Asian Journal of Research in Social Sciences and Humanities
Year : 2016, Volume : 6, Issue : cs1
First page : ( 157) Last page : ( 169)
Online ISSN : 2249-7315.
Article DOI : 10.5958/2249-7315.2016.00953.9

Detecting False Point Data Attacks using Hierarchal Proof Identification in Mobile Ad Hoc Network

Theresa W. Gracy*, Dr. Sakthivel S.**

*Assistant Professor, Department of Computer Science, Adhiyamaan College of Engineering, Hosur, India

**Professor, Department of Information Technology, Sona College of Technology, Salem, India

Online published on 15 September, 2016.

Abstract

The security detecting role is one of the network-based sensitive data-leak detection (DLD) method is the main aspect of which is that the detection didn't need the data owner to reveal the content of the secure the sensitive data. Privacy in one of the main issue in data networks it has been of extreme concern in recent years that exposes sensitive information in data detecting. In recent studies the privacy sensitive information doesn't have well proposed solutions for provided that privacy of detecting DLD. The intrusion detection enhances the hierarchical proof identification id assignment to analyses the steps to minimize the revelation of sensitive data and enables the data holder to safely allot the detection to other information holder. The algorithm comprise to attain the study that includes the data sanitization follows the construction of sensitive utility if ID assignment and detecting rule access the security role with IP verification. To proposed implementation can detect data owner's reveals data-leak detection as an additional service with strong privacy guarantees. Our proposed evaluation results detects various data-leak situations and setups show that our proposed technique can support exact sensitive information loss detection with very small number of false excitements, even the presentation of the data has been transformed without leakage. It also indicates that the detection accurateness does not degrade when partial digests recover secure policies standards.

Top

Keywords

Wireless network, Intrusion detection of Data detecting, DLD (Dynamic Leakage Detection).

Top

  
║ Site map ║ Privacy Policy ║ Copyright ║ Terms & Conditions ║ Page Rank Tool
750,166,086 visitor(s) since 30th May, 2005.
All rights reserved. Site designed and maintained by DIVA ENTERPRISES PVT. LTD..
Note: Please use Internet Explorer (6.0 or above). Some functionalities may not work in other browsers.