Data Leakage Detection using Cloud Computing
Keywords:
secured, confidential and must not be reproduced, trusted third parties are confidential and highly important
Abstract
Today the present world mostly depends on exchange of information i.e. transfer of data from one person to another person which is also known as distributary system. The data is sent from the distributor to the user are confidential so the data is distributed only between the distributor and the trusted third parties. The data sent by the distributor must be secured, confidential and must not be reproduced as the data shared with the trusted third parties are confidential and highly important. In some occasions the data distributed by the distributor are copied by different agents who cause a huge damage to the institute and this process of losing the data is known as data leakage. The data leakage must be detected in the early stage in order to protect the data form being open source. This project deals with protecting the data from being out sourcing by giving a special inscription to the sensitive data so that it cannot be reproduced.
Downloads
- Article PDF
- TEI XML Kaleidoscope (download in zip)* (Beta by AI)
- Lens* NISO JATS XML (Beta by AI)
- HTML Kaleidoscope* (Beta by AI)
- DBK XML Kaleidoscope (download in zip)* (Beta by AI)
- LaTeX pdf Kaleidoscope* (Beta by AI)
- EPUB Kaleidoscope* (Beta by AI)
- MD Kaleidoscope* (Beta by AI)
- FO Kaleidoscope* (Beta by AI)
- BIB Kaleidoscope* (Beta by AI)
- LaTeX Kaleidoscope* (Beta by AI)
How to Cite
Published
2014-07-15
Issue
Section
License
Copyright (c) 2014 Authors and Global Journals Private Limited
This work is licensed under a Creative Commons Attribution 4.0 International License.