Data Reliance Surveillance
Tushar Bedke1, Dhanashree Kutre2
1Tushar Bedke, Electronics and Communication Department, Visvesvaraya Technological University, Organization, Maratha Mandal Engineering College, Belgaum, India.
2Dhanashree Kutre, Electronics and Communication Department, Visvesvaraya Technological University, Organization-Maratha Mandal Engineering College, Belgaum, India.
Manuscript received on January 22, 2014. | Revised Manuscript received on February 10, 2014. | Manuscript published on February 28, 2014. | PP: 138-142  | Volume-3, Issue-3, February 2014. | Retrieval Number:  C2615023314/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Network Security and Data protection is a very important approach in which the users should be encouraged to turn on the module in order to practically make use of trusted computing against well known data security problems. The best way to deal with such problems is to use this technology that has been found to provide very real benefits in terms of assuring trust between systems and effectively protecting, through hardware based encryption, critical information .Moreover the results should necessary satisfy the requirements of the users in respect of access rights, privacy and interoperability. This paper outlines a client-server system utilizing a Data Reliance Surveillance Module (DRS)-enabled computer to hinder forensic examination. We have explored in detail the entire process from the encryption to the reverse process decryption on different file formats mainly image, audio and text files. We describe and implement an approach on data protection and network security by utilizing trusted computing technology. The system allows for data confidentiality, plausible deniability, and hiding of traces that incriminating data was present on the client.
Keywords: Data Reliance, Surveillance Module (DRS).