Data Leakage Detection using Cloud Computing

Article ID

CSTBNO395

Data Leakage Detection using Cloud Computing

Sandilya Pemmaraju
Sandilya Pemmaraju K L University
V. Sushma
V. Sushma
Dr. K.V.Daya.Sagar
Dr. K.V.Daya.Sagar
DOI

Abstract

Today the present world mostly depends on exchange of information i.e. transfer of data from one person to another person which is also known as distributary system. The data is sent from the distributor to the user are confidential so the data is distributed only between the distributor and the trusted third parties. The data sent by the distributor must be secured, confidential and must not be reproduced as the data shared with the trusted third parties are confidential and highly important. In some occasions the data distributed by the distributor are copied by different agents who cause a huge damage to the institute and this process of losing the data is known as data leakage. The data leakage must be detected in the early stage in order to protect the data form being open source. This project deals with protecting the data from being out sourcing by giving a special inscription to the sensitive data so that it cannot be reproduced.

Data Leakage Detection using Cloud Computing

Today the present world mostly depends on exchange of information i.e. transfer of data from one person to another person which is also known as distributary system. The data is sent from the distributor to the user are confidential so the data is distributed only between the distributor and the trusted third parties. The data sent by the distributor must be secured, confidential and must not be reproduced as the data shared with the trusted third parties are confidential and highly important. In some occasions the data distributed by the distributor are copied by different agents who cause a huge damage to the institute and this process of losing the data is known as data leakage. The data leakage must be detected in the early stage in order to protect the data form being open source. This project deals with protecting the data from being out sourcing by giving a special inscription to the sensitive data so that it cannot be reproduced.

Sandilya Pemmaraju
Sandilya Pemmaraju K L University
V. Sushma
V. Sushma
Dr. K.V.Daya.Sagar
Dr. K.V.Daya.Sagar

No Figures found in article.

Sandilya Pemmaraju. 2014. “. Global Journal of Computer Science and Technology – B: Cloud & Distributed GJCST-B Volume 14 (GJCST Volume 14 Issue B3): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 14 Issue B3
Pg. 13- 15
Classification
Not Found
Article Matrices
Total Views: 8534
Total Downloads: 2289
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Data Leakage Detection using Cloud Computing

Sandilya Pemmaraju
Sandilya Pemmaraju K L University
V. Sushma
V. Sushma
Dr. K.V.Daya.Sagar
Dr. K.V.Daya.Sagar

Research Journals