计算机工程与信息技术学报

Detecting Data Leaks Defending Against Illegal Content Redistribution

Ganesh Kumar P*, K Suthendran, Natrajan NK and Ramprasanna P

This project will undertake the initial enquiry in safe broadcasting dissemination by reasonable traitorous outlining in secure online server multimedia centre. To begin, we show that a feasible approach exists that utilizes proxy encryption for secure sharing of media with equitable water marking for equitable traitorous monitoring. The supplier of the content publishes encrypted media recordings to the online server. When a user requests this content, the information producer re-encrypts it with an additional key and transmits it to the user. Users that receive information from the online server and subsequently publish that information in the online server anew are considered dishonest users, and this file cannot be posted to the online server. It allows for the secure delivery of subcontracted mass media contented on approved handlers though fairly outlining illegitimate contented redeployment. It investigates the safety features also performs widespread testing for determine the efficacy also applicability of solution. It delivers comprehensive analysis of complexity for content provider efficiency in compute, communication, and storage. The data assets leakage defence system is designed to display the entire list of information assets, confirm the risk evaluation methodology for data resources for centralized cataloging, and exhibit the grade of risk dissemination information visualization exhibit, based on the categorization features of the information safety label of the versatile instances such as the technology application effect, in order to efficiently minimize the possibility of data leakage.

免责声明: 此摘要通过人工智能工具翻译,尚未经过审核或验证