Data Leakage Detection using Cloud Computing

Authors

  • Sandilya Pemmaraju

  • V. Sushma

  • Dr. K.V. Daya. Sagar

Keywords:

secured, confidential and must not be reproduced, trusted third parties are confidential and highly important

Abstract

Today the present world mostly depends on exchange of information i.e. transfer of data from one person to another person which is also known as distributary system. The data is sent from the distributor to the user are confidential so the data is distributed only between the distributor and the trusted third parties. The data sent by the distributor must be secured, confidential and must not be reproduced as the data shared with the trusted third parties are confidential and highly important. In some occasions the data distributed by the distributor are copied by different agents who cause a huge damage to the institute and this process of losing the data is known as data leakage. The data leakage must be detected in the early stage in order to protect the data form being open source. This project deals with protecting the data from being out sourcing by giving a special inscription to the sensitive data so that it cannot be reproduced.

How to Cite

Sandilya Pemmaraju, V. Sushma, & Dr. K.V. Daya. Sagar. (2014). Data Leakage Detection using Cloud Computing. Global Journal of Computer Science and Technology, 14(B3), 13–15. Retrieved from https://computerresearch.org/index.php/computer/article/view/1057

Data Leakage Detection using Cloud Computing

Published

2014-07-15