Return to Article Details Data Leakage Detection using Cloud Computing