Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{170669, author = {G ASHAJYOTHI and K JYOTHI and CHOPPADANDI KEERTHI and P SHANMUKHA KUMAR}, title = {LOCATION BASED FILE INTEGRITY MONITORING & PREVENTING}, journal = {International Journal of Innovative Research in Technology}, year = {2024}, volume = {11}, number = {7}, pages = {1564-1570}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=170669}, abstract = {File Integrity Monitoring (FIM) is a critical security mechanism used to detect unauthorized modifications, deletions, or additions to files. Traditional FIM systems focus on monitoring file changes but lack spatial awareness, which can be a vital context in identifying and mitigating potential security threats. The effectiveness of an integrity checker depends on factors such as the strength of the cryptographic algorithms used, the frequency of checks, and the robustness of the overall system architecture. Challenges in implementing integrity checkers include balancing performance with security and addressing evolving threats. Integrity checkers play a vital role in safeguarding data integrity across various domains. Their continued development and integration into systems are essential for ensuring reliable and secure information management in an increasingly complex digital landscape.}, keywords = {Unauthorized changes, Data integrity, File modification.}, month = {December}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry