“DOCU SAFE” Secure Data Management System Using Machine Learning

Abstract

A data management system is crucial to businesses as it efficiently organizes, secures, and leverages data, enabling informed decision-making, streamlined operations, and improved competitiveness. Machine learning enhances data management by automating insights extraction, predictive analytics, and pattern recognition, optimizing data utilization and driving informed business strategies. DOCU SAFE is a web base secure data management system that uses machine learning and NLP to enable organizations to store, manage, and analyze their data securely. The system addresses the challenges associated with data uploading, moving, and processing, including size/storage/volume of data, inconsistency and variety of data, formatting of data, security of data, analyzing and mapping of data, and cost management issues. DOCU SAFE provides a scalable solution for data management, enabling organizations to handle large volumes of data efficiently. The system uses machine learning algorithms to ensure that data is consistent, accurate, and secure, providing organizations with insights that can be used to make informed decisions. The data we enter here can be directed to four categories of classification, hidden and highlight, encryption, and hygiene solutions according to our needs. They currently have many tools in this regard, but there are problems with them. In addition, there are separate tools for data classification, data hidden and highlight, data encryption, data hygiene solutions, and there is no possibility to do everything with one tool/system. Here, all the above issues are the provided by same tool. Overall, DOCU SAFE is an effective solution for organizations that handle sensitive data and need a secure and efficient data management system.

Country : Sri Lanka

1 R.M.P.S.Rajapaksha2 S.A.A.T.S.Sooriyamali3 L.D.C.Jayarathna4 H.S.D De Silva5 Ms.Chethana Liyanapathirana6 Dr. Lakmal Rupasinghe

  1. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  2. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  3. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  4. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  5. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  6. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka

IRJIET, Volume 7, Issue 11, November 2023 pp. 32-49

doi.org/10.47001/IRJIET/2023.711007

References

  1. F. Ridzuan and W. M. N. Wan Zainon, “A review on data cleansing methods for big data,” Procedia Comput. Sci., vol. 161, pp. 731–738, 2019.
  2. J.-S. Hwang, S.-D. Mun, T.-J. Kim, G.-W. Oh, Y.-S. Sim, and S. J. Chang, “Development of data cleaning and integration algorithm for asset management of power system,” Energies, vol. 15, no. 5, p. 1616, 2022.
  3. J. Clements, “Challenges involved in data cleansing & current approaches,” Managed Outsource Solutions, 24-Aug-2022. [Online]. Available: https://www.managedoutsource.com/blog/data-cleansing-challenges-current-approaches/. [Accessed: 17-Aug-2023].
  4. I.P. Preethi P. Bhathh, "OPTICAL CHARACTER RECOGNITION USING DEEP LEARNING – A TECHNICAL REVIEW," India, 2018.
  5. A.K.K.K.S.S. Diksha Khurana, "Natural Language Processing: State of The Art, Current Trends and Challenges," India, 2022.
  6. A.B. Musa, "Logistic Regression Classification for Uncertain Data," China, 2014.
  7. D. K. Shivasthava, "DATA CLASSIFICATION USING SUPPORT VECTOR MACHINE," India, 2010.
  8. R. K. N. A. I. M. Jehad Ali, "Random Forests and Decision Trees," Pakistan, 2012.
  9. B. T. Jijo, "Classification Based on Decision Tree Algorithm for Machine Learning," Iraq, 2021.
  10. Honeyman, "Hide and seek: an introduction to steganography," IEEE Secur. Privacy, vol. Volume: 1, no. IEEE, pp. 32 - 44, may-june 2003.
  11. K. Pathak, "A Survey of Data Hiding Techniques," International Journal of Computer Applications (0975 - 8887), vol. Volume 182, no. Foundation of Computer Science, No.28, November 2018.
  12. V. M. Manikandan, "A Reversible Data Hiding Scheme through Encryption using Rotated Stream Cipher," Computer Science, p. 22(2), 2021-04-15.
  13. V. M. Manikandan, "A Novel Reversible Data Hiding Scheme that Provides Image Encryption," Journal of Image and Graphics, vol. 6(1), pp. 64-68, 2018.
  14. Researchgate.net. [Online]. Available: https://www.researchgate.net/publication/355905228_Secure_KNN_Classification_Scheme_Based_on_Homomorphic_Encryption_for_Cyberspace. [Accessed: 19-Aug-2023].
  15. Y. Tong and I. Tien, “Time-series prediction in nodal networks using recurrent neural networks and a pairwise-gated recurrent unit approach,” ASCE ASME J. Risk Uncertain. Eng. Syst. A Civ. Eng., vol. 8, no. 2, 2022.
  16. A.Mohammed and R. Kora, “A comprehensive review on ensemble deep learning: Opportunities and challenges,” J. King Saud Univ. - Comput. Inf. Sci., vol. 35, no. 2, pp. 757–774, 2023.
  17. Researchgate.net. [Online]. Available: https://www.researchgate.net/publication/265077297_RESEARCH_PAPER_ON_CLUSTER_TECHNIQUES_OF_DATA_VARIATIONS. [Accessed: 19-Aug-2023].