TY - JOUR TI - A Computational System in Sequence of Information Ruptures AU - MD Nazimuddin Ahmed AU - Md Ateeq Ur Rahman JO - International Journal of Scientific Research in Computer Science, Engineering and Information Technology PB - Technoscience Academy DA - 2017/08/31 PY - 2017 DO - https://doi.org/10.32628/IJSRCSEIT UR - https://ijsrcseit.com/CSEIT172460 VL - 2 IS - 4 SP - 321 EP - 327 AB - This paper contains the achievement of information lineage in malevolent situations. Data breach of individuals is a serious issue considering the information confidentiality and reliability of the data provider. The data provider should properly scrutinize the situation of data infringement and analyze possible solutions for blocking such trespassers. Here we intend to present a system that specifically eliminates all such fissures during allocation of data. The designed methods primarily concentrate upon narrowing down the breach of data instead of only providing alternate data or faked data. Data sent over any network is prone and exposed to different network data breaches. So, diligent security must be implemented with the information sent over the transferred network. With rapid increase in communication means, our smart phones and social networks have a lot of private and confidential information, and all these may be leaked without security. To counter this, data descent mechanism is used or in general the concept of data descent in malevolent conditions is deployed. This generally initiates with improper information fed to suspected requester. The system is developed in a critical environment prone to attack wherein we can transfer our data with different information coupled with different cryptographic techniques. Furthermore, experimental analysis of our design and proper implementation is done in vivid situations of within and outside transfer of organizational data. So, we define the aspects of data breach in various possible situations in general and well-defined implementation of our system in particular to analyze and provide a secure means of data descent.