SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 111
Detecting Data Leakage and Implementing Security Measures in Cloud
Computing
Syeda Hajira Tabassum1, Soumya Naik2
1MTech, Dept. of Computer Science & Engineering, City Engineering College, Karnataka, India
2Assitant Professor, Dept. of Computer Science & Engineering, City Engineering College, Karnataka, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract – Most of the data has been proceed through
third-party application (TPA) anduserareunawareaboutthe
security essentials in cloud computing. The data owner will
store the data in the cloud. Every user must have registered in
the cloud. Cloud provider must verify the authorized user. If
someone try to access the account, data will get leaked. This
leaked data will present in an unapproved site as in on the
internet or someone’s computer. In this paper, to address
performance and security issue. We propose DROPS
methodology, abbreviated as Division and ReplicationofData
in the Cloud for Optimal Performance and Security. In this
methodology, we have to select the file and then store the
particular file in the cloud account. In order to provide
security, we are going to implement DROPS concepts. Now we
divide the file into various fragments based on the threshold
value. Each and every fragments are stored in the node using
T-Coloring. After the placement of fragments in node, it is
necessary to replicate each fragments for one time in cloud.
Key Words: DROPS, leaked, cloud computing, data
leakage, T-Colouring,
1. INTRODUCTION
Every company focus on security issues of securing the data
from different third parties form being out sourced. Every
company follows a different strategy which does not match
with any other company.The employeesintheorganizations
are being trained to support the data secrecy and the
fundamental structure of the organization. The safety must
be beyond the employees’ knowledge so that the employee
has no idea of cracking it by covering logical and physical
security. Information security is frequently subjected to
metaphors. The information security must be targeted at
global level by not letting the user know the problematic
issues faced by the security department and also the logical
security i.e. the sensitive data, applications and also the
operating system used in a particular institute. The security
must also be extended to telecommunication department of
the institute so that they have a network security also.
Data Leakage may take place at any time, there is no
designated time. Data leakage rely onlyonthesignificanceof
sharing information by the agent. The information
distributed is consideredassensitivedata whenitconsistsof
information about the client, budget, code and any design
specification. If the leakage occurs, it leaves the institute in
unprotected state. This data leakage places the institute or
organizations in the state of uncertainty resulting in the
decry of the business and eventually defeat of the company.
Cloud computing security is growing in information
security, computer security.Inmostcasesitisrecommended
that based on the segment of risks security of data control to
be choose and executed, by evaluating the vulnerabilities
threats, and influences. The security concerns of the cloud
can then be organized in different ways;Gartner[9]discover
14 regions of distress during the alliance of Cloud Security.
Traditionally, Watermarking techniqueisusedtohandle
data leakage detection. For instance, in every distributed
copies a unique code is embedded using different types of
watermarking algorithm. If this copyatlatertimeisfound by
any unauthorized person, the personcan’tbeidentified. This
result in the major drawback in watermarking technique.
Though Watermarking technique is advantageous in real-
time domain, yet again, few changes in the original
information. In no time, if the recipient of the data is
malicious, watermarks will be destroyed. Security is one of
the most crucial aspects in cloud computing. Hence this
prohibit the adoption of cloud computing. Hence, in this
paper, we addressed the issue of security and performance.
We proposed Division and Replication of Data in the Cloud
for Optimal Performance and Security (DROPS) this will
break the owner’s files into various sections and replace
them in the cloud space. The owner of the data decides the
threshold value, based on this value fragments of a file is
performed. So that the meaning full information is not held
by the fragments.
Any attack that is successful on any nodeshouldnothint
the position of other fragments present within the cloud
space. This in turn make the intruder cannot predict
locations of file fragments so that it improves the security in
the cloud. By using T-Coloring concept is usedtodothenode
separation in order to select nodes in such a way that nodes
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 112
are not adjacent and are at obviousdistancefromeachother.
Furthermore, the fragments storing in the nodes are placed
with an obvious distance with the aid of graph T-Coloring in
order to block an intruder from accessing the site of the
fragments.
2. LITERATURE SURVERY
Prashant Khobragade [8] [10] proposed that to detect the
region where the attack has been taken place it is requiredto
inspect data in the browser history. The inspected data is
then brought together and put into database as a proof. The
suggested method and forensic toolkit helps to analyze the
data for the law enforcement.
Sandip A. Kale, S.V. Kulkarni [2] focuses on robust
watermarking technique, this technique will be useful in few
cases, yet again, few modification of the original data is
required. Moreover, watermarks will bedestroyedifthedata
recipient is vengeful. The agent can add fake items to the
spread data to improve the potency in finding criminal
agents.
Sushilkumar, B.Shinde, Archana. Bhosale [3], shows that
in different institutes and organizations data leakage is
spotted as the very serious and big challenge. They have
further explained that sellers add fake information that is
shared among the consumers in an attempt to increase the
chance to detect criminal agents. This is detection of data
leakage is then handled by an algorithm.
Data leakage [7] [12] takes place in everyday life this
happens when private business informationlikeinformation
of consumer, technical code or design description, amount
lists, intellectual property and secrets of trade and
spreadsheets of budgetsareleaked.Whenthisinformationor
data is dripped out it puts the company in the state of
unprotected. This leads business in an unsafe position,
Putting the company in serious risk due to data leakage.
3. EXISTING SYSTEM
Water marking Technique: is a type of security technique
which deals with the idea of embedding a particular code or
encryption on the information that is to be distributed. The
information can be image or a video or any official file. This
encryption helps the company to claim the ownershiponany
particular data. Water marking is a technique where a bit
pattern is added to the data at a particular position on the
tuples and subset of the data. The tuple and subset and their
attributes are algorithmically coded in such a way that they
are controlled by a key which can be accessed only by the
owner.
Fake Objects Method: this method causes less problems
to the real objects by introducing fake objects in some
applications. Consider an example, where hospitals are
agents and medical records are distributed data items. Here
in the records even the small change is undesirable. Still, the
addition of fake information to the records will not affect as
this data would notbematchinganypatientrecordandhence
no patient would be treated on the basis of fake records
injected. In this case, company A Company X sellsproductsto
company Y a list to send advertisements be used once.
Company X then injects trace data which contain addresses
possess by company X. Thus, every time company Y
purchases the product through list, company will receive a
copies of the mails. This tracedataarefakeitemsthatenables
to identify the misuse of data.
4. PROPOSED SYSTEM
Detecting data leakage: The data owner first registered into
the cloud account. Each and every user has to registered into
the cloud. Now the data owner and user will become the
authorized person. The data owner will upload the file into
the cloud. Now the data owner login into the account, at that
timethe cloud provider verifies the alreadyregisteredowner
or not. If they are registered owner and then they will
transfer the file to the users who have registered. The user
can now login intotheiraccount,cloudprovideragainverifies
the user. The user will download the file sent by the data
owner.
If someone try to copy the URL, the data get leaked in
someone’s laptop. Now the details about the unauthorized
person will be tracked. This tracked information sent as a
mobile intimation to the data owner. The mobile intimation
will hold information like IP address, MAC address and GPS
location.
Fig -1: Data Leakage Architecture
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 113
Drops Methodology: In DROPS methodology, we are not
storing the entire file in cloudspace. Now weare splittingthe
entire file into various fragments. These fragments have to
distribute in the cloud space. Each and every fragment has to
place in a particular node. So that each node contains only a
single fragment. In each successful attack the node will not
reveal the significant information. After the fragmentation
process replication will takes place. In replication process,
each fragment has to replicate its content once in the cloud
space. In this way in the cloud computing we can achieve
security. In DROPS methodology, data file is sent to the cloud
space by the user. Cloud manager performs the following on
file receiving: (1) File Fragmentation (2) Selecting Nodes (3)
Fragment stores (4) Nodes selection for fragments
replication.
Fig -2: DROPS Methodology
Drops Implementation
File Fragmentation: In cloud, security is the major aspects
for a large-scale system. Thisprovides the system securityas
individual nodes and whole. On every successful action of
intruding intosingle nodeit providesmoreresultoreffectfor
data and other nodes. A successful intrusion may lead to
software failure. It may also lead to administration
defenseless. File fragmentation is a term that describes a
group of files that are scattered throughout the cloud. The
data owner splits the fileintovariouspiecescalledfragments.
The size of fragmentation is decided by data owner using
threshold value. In variousaspectsthethresholdvaluecanbe
fixed, they are, 1. Decide percentage based on file size. 2.
Numbering ofeachfragments.Forexample,firstfragmentthe
file by 10% of total size or split the file by using various size
like fragment 404MB, fragment 1000MB. It is alsopossibleto
number the fragments like fragment1, fragment2 etc., The
numbering of each fragments only known to the data owner.
There are three types of fragmentation: 1. Horizontal. 2.
Vertical. 3. Mixed (Hybrid).
Fragment Placement: In ordertogivesecuritywhenputting
the fragments in to the cloud, the T-coloring concept is
essential.ChanneltaskproblemsmainlyusesT-Coloring.This
will generatea positive number,randomnumber,tobuildthe
set T by generating random number from zero as start. It
assigns colors to the each and every node, in the beginning,
all nodes will be in open color. The fragmentisthenplacedon
particular node, all the nodes in the neighborhood are at
certain distance which will be belonging to set T and these
are allocate to close color. In this series of actions, this will
lose few central nodes in cloud so that may rise time to
retrieve. If anyhow the intruders try to track the node
position and take the fragment, user cannot make out the
precise location of other fragments.Theintruderendsupjust
predicting thelocationofotherfragmentsincloud.Therefore,
T-coloring concepts are used to separate the nodes.
Fragment Copying/Reproducing: In replication process,
unique copy exists and the same copy will exist once again.
The replication process is used to elevate the availability of
data and their by improve the time to retrieve. This carry out
a controlled reproducing. In replicationprocess,copiesofthe
samedata item have the same value. There are three types of
replication, 1. No replication. 2. Fully replicated. 3. Partial
replication. It positions the fragment on the node that gives
the limited cost access. Hence improve the time to retrieve
the access of the fragments and rebuilding of the original file.
While reproducing the fragment, by T-coloring fragment
separation is achieved, it also takes care of node placement.
In instance of a large counts of fragments or small count of
nodes, there is a possibility thatfewofthefragmentscouldbe
left without being reproducing due to the use of T-coloring
concepts.
T-Coloring: T-coloring forbid keeping the fragment and
also avoid storing a fragment in the node of a neighborhood,
this results in eliminating the nodes that is used to retain. In
such scenarios, where only the remaining fragments, those
nodes are selected which are not possessing any fragments
forrandom storage. T-coloring concept isappliedtoseparate
nodes. The process of fragmentationmadesurenosuccessful
information is obtained in successful attack. In the cloud, no
nodestored the instances of samefile of single fragment.The
DROPS methodology execution is compared with full-scale
reproducingtechniques.Thisoutcomedrawstheattentionon
the performance and security. This rise in the level of data
security.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 114
DROPS methodology isproppedsecurityschemeinthecloud
storage that deals with the performance and security that
increase the time to retrieve. Data in the files were
fragmented and these fragments are spreadovermultipleor
many nodes. The fragmented file will be replicated their by
increasing data availabilityandprovidesecuritytothecloud.
The fragmented file will be replicated their by increasing
data availability and provide security to the cloud.
REFERENCES
[1] Chandu Vaidya and Prashant Khobragade,2015, “Data
Security in Cloud Computing”, ISSN: 2321-8169 .
[2] Sandip A. Kale, Prof. S.V.Kulkarni,” Data Leakage
Detection”, International Journal of Advanced Research
in Computer and Communication Engineering, Vol. 1,
Issue 9, November 2012.
[3] Prof. Sushilkumar N. Holambe, Dr.Ulhas B.Shinde,
Archana U. Bhosale,”data LeakageDetectionUsingCloud
Computing ”, International Journal Of Scientific &
Engineering Research, Volume 6, Issue 4,( April-2015).
[4] P. Papadimitriou and H. GarciaMolina, “Data Leakage
Detection,” technical report, Stanford Univ., 2008.
[5] Hartung and kutter,.Watermarking technique for
multimedia data.2003.
[6] Priyanka Barge, Pratibha Dhawale,Namrata Kolashetti,”
A Novel Data Leakage Detection”, International Journal
of Modern Engineering Research (IJMER) ISSN: 2249-
6645, Vol.3, Issue.1, Jan-Feb. 2013.
[7] Archana Vaidya, Prakash Lahange, Kiran More, Shefali
Kachroo and Nivedita Pandey,”Data LeakageDetection”,
International Journal of Advances in Engineering &
Technology, ISSN: 2231-1963, March 2012.
[8] Prashant Khobragade, Latesh G. Malik,“A Review on
Data Generation for Digital Forensic Investigationusing
Datamining”, IJCAT International Journal of Computing
and Technology, Volume 1, Issue 3, April 2014.
[9] Jon Brodkin, “Gartner: Seven cloud-computing security
risks”. InfoWorld. 2008-07-02. Retrieved 2010-01-25.
[10] Khobragade, P. K., & Malik, L. G., “Data Generation and
Analysis for Digital Forensic Application Using Data
Mining”. In Communication Systems and Network
Technologies (CSNT), 2014 Fourth International
Conference on (pp. 458-462). IEEE. April, 2014.
[11] Iqbal, C. Z. Xu, and A. Y. Zomaya, “Quantitative
comparisons of the state of the art data center
architectures,” Concurrency and Computation: Practice
and Experience, Vol. 25, No. 12, 2013, pp. 1771-1783.
[12] Chandu Vaidya etl. & BE scholars “Data leakage
Detection and Dependable Storage Service in cloud
Computing” IJSTE volume 2 issues 10 April 2016 ISSN
online 2349-784X
5. CONCLUSION

More Related Content

What's hot

IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET Journal
 
Splunk for Security Workshop
Splunk for Security WorkshopSplunk for Security Workshop
Splunk for Security WorkshopSplunk
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss PreventionGary Bahadur
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive OverviewKim Jensen
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...IRJET Journal
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageIRJET Journal
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET Journal
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET Journal
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataIRJET Journal
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET Journal
 

What's hot (20)

IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
 
Splunk for Security Workshop
Splunk for Security WorkshopSplunk for Security Workshop
Splunk for Security Workshop
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
 

Similar to IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Computing

10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...IRJET Journal
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSIRJET Journal
 
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET Journal
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingIJMER
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET Journal
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing IRJET Journal
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET Journal
 
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...IRJET Journal
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...Editor IJMTER
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingData Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingIJERA Editor
 

Similar to IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Computing (20)

10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
 
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive Data
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future Directions
 
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingData Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud Computing
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 

Recently uploaded (20)

High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 

IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Computing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 111 Detecting Data Leakage and Implementing Security Measures in Cloud Computing Syeda Hajira Tabassum1, Soumya Naik2 1MTech, Dept. of Computer Science & Engineering, City Engineering College, Karnataka, India 2Assitant Professor, Dept. of Computer Science & Engineering, City Engineering College, Karnataka, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract – Most of the data has been proceed through third-party application (TPA) anduserareunawareaboutthe security essentials in cloud computing. The data owner will store the data in the cloud. Every user must have registered in the cloud. Cloud provider must verify the authorized user. If someone try to access the account, data will get leaked. This leaked data will present in an unapproved site as in on the internet or someone’s computer. In this paper, to address performance and security issue. We propose DROPS methodology, abbreviated as Division and ReplicationofData in the Cloud for Optimal Performance and Security. In this methodology, we have to select the file and then store the particular file in the cloud account. In order to provide security, we are going to implement DROPS concepts. Now we divide the file into various fragments based on the threshold value. Each and every fragments are stored in the node using T-Coloring. After the placement of fragments in node, it is necessary to replicate each fragments for one time in cloud. Key Words: DROPS, leaked, cloud computing, data leakage, T-Colouring, 1. INTRODUCTION Every company focus on security issues of securing the data from different third parties form being out sourced. Every company follows a different strategy which does not match with any other company.The employeesintheorganizations are being trained to support the data secrecy and the fundamental structure of the organization. The safety must be beyond the employees’ knowledge so that the employee has no idea of cracking it by covering logical and physical security. Information security is frequently subjected to metaphors. The information security must be targeted at global level by not letting the user know the problematic issues faced by the security department and also the logical security i.e. the sensitive data, applications and also the operating system used in a particular institute. The security must also be extended to telecommunication department of the institute so that they have a network security also. Data Leakage may take place at any time, there is no designated time. Data leakage rely onlyonthesignificanceof sharing information by the agent. The information distributed is consideredassensitivedata whenitconsistsof information about the client, budget, code and any design specification. If the leakage occurs, it leaves the institute in unprotected state. This data leakage places the institute or organizations in the state of uncertainty resulting in the decry of the business and eventually defeat of the company. Cloud computing security is growing in information security, computer security.Inmostcasesitisrecommended that based on the segment of risks security of data control to be choose and executed, by evaluating the vulnerabilities threats, and influences. The security concerns of the cloud can then be organized in different ways;Gartner[9]discover 14 regions of distress during the alliance of Cloud Security. Traditionally, Watermarking techniqueisusedtohandle data leakage detection. For instance, in every distributed copies a unique code is embedded using different types of watermarking algorithm. If this copyatlatertimeisfound by any unauthorized person, the personcan’tbeidentified. This result in the major drawback in watermarking technique. Though Watermarking technique is advantageous in real- time domain, yet again, few changes in the original information. In no time, if the recipient of the data is malicious, watermarks will be destroyed. Security is one of the most crucial aspects in cloud computing. Hence this prohibit the adoption of cloud computing. Hence, in this paper, we addressed the issue of security and performance. We proposed Division and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) this will break the owner’s files into various sections and replace them in the cloud space. The owner of the data decides the threshold value, based on this value fragments of a file is performed. So that the meaning full information is not held by the fragments. Any attack that is successful on any nodeshouldnothint the position of other fragments present within the cloud space. This in turn make the intruder cannot predict locations of file fragments so that it improves the security in the cloud. By using T-Coloring concept is usedtodothenode separation in order to select nodes in such a way that nodes
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 112 are not adjacent and are at obviousdistancefromeachother. Furthermore, the fragments storing in the nodes are placed with an obvious distance with the aid of graph T-Coloring in order to block an intruder from accessing the site of the fragments. 2. LITERATURE SURVERY Prashant Khobragade [8] [10] proposed that to detect the region where the attack has been taken place it is requiredto inspect data in the browser history. The inspected data is then brought together and put into database as a proof. The suggested method and forensic toolkit helps to analyze the data for the law enforcement. Sandip A. Kale, S.V. Kulkarni [2] focuses on robust watermarking technique, this technique will be useful in few cases, yet again, few modification of the original data is required. Moreover, watermarks will bedestroyedifthedata recipient is vengeful. The agent can add fake items to the spread data to improve the potency in finding criminal agents. Sushilkumar, B.Shinde, Archana. Bhosale [3], shows that in different institutes and organizations data leakage is spotted as the very serious and big challenge. They have further explained that sellers add fake information that is shared among the consumers in an attempt to increase the chance to detect criminal agents. This is detection of data leakage is then handled by an algorithm. Data leakage [7] [12] takes place in everyday life this happens when private business informationlikeinformation of consumer, technical code or design description, amount lists, intellectual property and secrets of trade and spreadsheets of budgetsareleaked.Whenthisinformationor data is dripped out it puts the company in the state of unprotected. This leads business in an unsafe position, Putting the company in serious risk due to data leakage. 3. EXISTING SYSTEM Water marking Technique: is a type of security technique which deals with the idea of embedding a particular code or encryption on the information that is to be distributed. The information can be image or a video or any official file. This encryption helps the company to claim the ownershiponany particular data. Water marking is a technique where a bit pattern is added to the data at a particular position on the tuples and subset of the data. The tuple and subset and their attributes are algorithmically coded in such a way that they are controlled by a key which can be accessed only by the owner. Fake Objects Method: this method causes less problems to the real objects by introducing fake objects in some applications. Consider an example, where hospitals are agents and medical records are distributed data items. Here in the records even the small change is undesirable. Still, the addition of fake information to the records will not affect as this data would notbematchinganypatientrecordandhence no patient would be treated on the basis of fake records injected. In this case, company A Company X sellsproductsto company Y a list to send advertisements be used once. Company X then injects trace data which contain addresses possess by company X. Thus, every time company Y purchases the product through list, company will receive a copies of the mails. This tracedataarefakeitemsthatenables to identify the misuse of data. 4. PROPOSED SYSTEM Detecting data leakage: The data owner first registered into the cloud account. Each and every user has to registered into the cloud. Now the data owner and user will become the authorized person. The data owner will upload the file into the cloud. Now the data owner login into the account, at that timethe cloud provider verifies the alreadyregisteredowner or not. If they are registered owner and then they will transfer the file to the users who have registered. The user can now login intotheiraccount,cloudprovideragainverifies the user. The user will download the file sent by the data owner. If someone try to copy the URL, the data get leaked in someone’s laptop. Now the details about the unauthorized person will be tracked. This tracked information sent as a mobile intimation to the data owner. The mobile intimation will hold information like IP address, MAC address and GPS location. Fig -1: Data Leakage Architecture
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 113 Drops Methodology: In DROPS methodology, we are not storing the entire file in cloudspace. Now weare splittingthe entire file into various fragments. These fragments have to distribute in the cloud space. Each and every fragment has to place in a particular node. So that each node contains only a single fragment. In each successful attack the node will not reveal the significant information. After the fragmentation process replication will takes place. In replication process, each fragment has to replicate its content once in the cloud space. In this way in the cloud computing we can achieve security. In DROPS methodology, data file is sent to the cloud space by the user. Cloud manager performs the following on file receiving: (1) File Fragmentation (2) Selecting Nodes (3) Fragment stores (4) Nodes selection for fragments replication. Fig -2: DROPS Methodology Drops Implementation File Fragmentation: In cloud, security is the major aspects for a large-scale system. Thisprovides the system securityas individual nodes and whole. On every successful action of intruding intosingle nodeit providesmoreresultoreffectfor data and other nodes. A successful intrusion may lead to software failure. It may also lead to administration defenseless. File fragmentation is a term that describes a group of files that are scattered throughout the cloud. The data owner splits the fileintovariouspiecescalledfragments. The size of fragmentation is decided by data owner using threshold value. In variousaspectsthethresholdvaluecanbe fixed, they are, 1. Decide percentage based on file size. 2. Numbering ofeachfragments.Forexample,firstfragmentthe file by 10% of total size or split the file by using various size like fragment 404MB, fragment 1000MB. It is alsopossibleto number the fragments like fragment1, fragment2 etc., The numbering of each fragments only known to the data owner. There are three types of fragmentation: 1. Horizontal. 2. Vertical. 3. Mixed (Hybrid). Fragment Placement: In ordertogivesecuritywhenputting the fragments in to the cloud, the T-coloring concept is essential.ChanneltaskproblemsmainlyusesT-Coloring.This will generatea positive number,randomnumber,tobuildthe set T by generating random number from zero as start. It assigns colors to the each and every node, in the beginning, all nodes will be in open color. The fragmentisthenplacedon particular node, all the nodes in the neighborhood are at certain distance which will be belonging to set T and these are allocate to close color. In this series of actions, this will lose few central nodes in cloud so that may rise time to retrieve. If anyhow the intruders try to track the node position and take the fragment, user cannot make out the precise location of other fragments.Theintruderendsupjust predicting thelocationofotherfragmentsincloud.Therefore, T-coloring concepts are used to separate the nodes. Fragment Copying/Reproducing: In replication process, unique copy exists and the same copy will exist once again. The replication process is used to elevate the availability of data and their by improve the time to retrieve. This carry out a controlled reproducing. In replicationprocess,copiesofthe samedata item have the same value. There are three types of replication, 1. No replication. 2. Fully replicated. 3. Partial replication. It positions the fragment on the node that gives the limited cost access. Hence improve the time to retrieve the access of the fragments and rebuilding of the original file. While reproducing the fragment, by T-coloring fragment separation is achieved, it also takes care of node placement. In instance of a large counts of fragments or small count of nodes, there is a possibility thatfewofthefragmentscouldbe left without being reproducing due to the use of T-coloring concepts. T-Coloring: T-coloring forbid keeping the fragment and also avoid storing a fragment in the node of a neighborhood, this results in eliminating the nodes that is used to retain. In such scenarios, where only the remaining fragments, those nodes are selected which are not possessing any fragments forrandom storage. T-coloring concept isappliedtoseparate nodes. The process of fragmentationmadesurenosuccessful information is obtained in successful attack. In the cloud, no nodestored the instances of samefile of single fragment.The DROPS methodology execution is compared with full-scale reproducingtechniques.Thisoutcomedrawstheattentionon the performance and security. This rise in the level of data security.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 114 DROPS methodology isproppedsecurityschemeinthecloud storage that deals with the performance and security that increase the time to retrieve. Data in the files were fragmented and these fragments are spreadovermultipleor many nodes. The fragmented file will be replicated their by increasing data availabilityandprovidesecuritytothecloud. The fragmented file will be replicated their by increasing data availability and provide security to the cloud. REFERENCES [1] Chandu Vaidya and Prashant Khobragade,2015, “Data Security in Cloud Computing”, ISSN: 2321-8169 . [2] Sandip A. Kale, Prof. S.V.Kulkarni,” Data Leakage Detection”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 9, November 2012. [3] Prof. Sushilkumar N. Holambe, Dr.Ulhas B.Shinde, Archana U. Bhosale,”data LeakageDetectionUsingCloud Computing ”, International Journal Of Scientific & Engineering Research, Volume 6, Issue 4,( April-2015). [4] P. Papadimitriou and H. GarciaMolina, “Data Leakage Detection,” technical report, Stanford Univ., 2008. [5] Hartung and kutter,.Watermarking technique for multimedia data.2003. [6] Priyanka Barge, Pratibha Dhawale,Namrata Kolashetti,” A Novel Data Leakage Detection”, International Journal of Modern Engineering Research (IJMER) ISSN: 2249- 6645, Vol.3, Issue.1, Jan-Feb. 2013. [7] Archana Vaidya, Prakash Lahange, Kiran More, Shefali Kachroo and Nivedita Pandey,”Data LeakageDetection”, International Journal of Advances in Engineering & Technology, ISSN: 2231-1963, March 2012. [8] Prashant Khobragade, Latesh G. Malik,“A Review on Data Generation for Digital Forensic Investigationusing Datamining”, IJCAT International Journal of Computing and Technology, Volume 1, Issue 3, April 2014. [9] Jon Brodkin, “Gartner: Seven cloud-computing security risks”. InfoWorld. 2008-07-02. Retrieved 2010-01-25. [10] Khobragade, P. K., & Malik, L. G., “Data Generation and Analysis for Digital Forensic Application Using Data Mining”. In Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on (pp. 458-462). IEEE. April, 2014. [11] Iqbal, C. Z. Xu, and A. Y. Zomaya, “Quantitative comparisons of the state of the art data center architectures,” Concurrency and Computation: Practice and Experience, Vol. 25, No. 12, 2013, pp. 1771-1783. [12] Chandu Vaidya etl. & BE scholars “Data leakage Detection and Dependable Storage Service in cloud Computing” IJSTE volume 2 issues 10 April 2016 ISSN online 2349-784X 5. CONCLUSION