Submit Search
Upload
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Computing
•
0 likes
•
10 views
IRJET Journal
Follow
https://irjet.net/archives/V5/i12/IRJET-V5I1221.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET Journal
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET Journal
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET Journal
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Ulf Mattsson
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
IRJET Journal
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
IRJET Journal
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
IRJET Journal
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
Ulf Mattsson
Recommended
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET Journal
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET Journal
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET Journal
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Ulf Mattsson
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
IRJET Journal
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
IRJET Journal
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
IRJET Journal
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
Ulf Mattsson
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET Journal
Splunk for Security Workshop
Splunk for Security Workshop
Splunk
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
Gary Bahadur
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
IJERA Editor
DLP Executive Overview
DLP Executive Overview
Kim Jensen
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET Journal
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Network Intelligence India
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
Dlp notes
Dlp notes
anuepcet
Data Loss Prevention from Symantec
Data Loss Prevention from Symantec
Arrow ECS UK
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET Journal
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET Journal
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
DLP Data leak prevention
DLP Data leak prevention
Ariel Evans
Information Leakage & DLP
Information Leakage & DLP
Yun Lu
Data security and privacy
Data security and privacy
rajab ssemwogerere
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Seccuris Inc.
Cloud Computing
Cloud Computing
sahil lalwani
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET Journal
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET Journal
More Related Content
What's hot
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET Journal
Splunk for Security Workshop
Splunk for Security Workshop
Splunk
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
Gary Bahadur
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
IJERA Editor
DLP Executive Overview
DLP Executive Overview
Kim Jensen
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET Journal
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Network Intelligence India
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
Dlp notes
Dlp notes
anuepcet
Data Loss Prevention from Symantec
Data Loss Prevention from Symantec
Arrow ECS UK
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET Journal
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET Journal
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
DLP Data leak prevention
DLP Data leak prevention
Ariel Evans
Information Leakage & DLP
Information Leakage & DLP
Yun Lu
Data security and privacy
Data security and privacy
rajab ssemwogerere
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Seccuris Inc.
Cloud Computing
Cloud Computing
sahil lalwani
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET Journal
What's hot
(20)
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
Splunk for Security Workshop
Splunk for Security Workshop
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
DLP Executive Overview
DLP Executive Overview
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
Dlp notes
Dlp notes
Data Loss Prevention from Symantec
Data Loss Prevention from Symantec
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
DLP Data leak prevention
DLP Data leak prevention
Information Leakage & DLP
Information Leakage & DLP
Data security and privacy
Data security and privacy
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Cloud Computing
Cloud Computing
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
Similar to IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Computing
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET Journal
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
IRJET Journal
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET Journal
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
IJMER
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET Journal
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing
IRJET Journal
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET Journal
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET Journal
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET Journal
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET Journal
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
Editor IJMTER
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud Computing
IJERA Editor
Similar to IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Computing
(20)
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive Data
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud Computing
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
Call Girls in Nagpur High Profile
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Recently uploaded
(20)
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
Internship report on mechanical engineering
Internship report on mechanical engineering
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Computing
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 111 Detecting Data Leakage and Implementing Security Measures in Cloud Computing Syeda Hajira Tabassum1, Soumya Naik2 1MTech, Dept. of Computer Science & Engineering, City Engineering College, Karnataka, India 2Assitant Professor, Dept. of Computer Science & Engineering, City Engineering College, Karnataka, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract – Most of the data has been proceed through third-party application (TPA) anduserareunawareaboutthe security essentials in cloud computing. The data owner will store the data in the cloud. Every user must have registered in the cloud. Cloud provider must verify the authorized user. If someone try to access the account, data will get leaked. This leaked data will present in an unapproved site as in on the internet or someone’s computer. In this paper, to address performance and security issue. We propose DROPS methodology, abbreviated as Division and ReplicationofData in the Cloud for Optimal Performance and Security. In this methodology, we have to select the file and then store the particular file in the cloud account. In order to provide security, we are going to implement DROPS concepts. Now we divide the file into various fragments based on the threshold value. Each and every fragments are stored in the node using T-Coloring. After the placement of fragments in node, it is necessary to replicate each fragments for one time in cloud. Key Words: DROPS, leaked, cloud computing, data leakage, T-Colouring, 1. INTRODUCTION Every company focus on security issues of securing the data from different third parties form being out sourced. Every company follows a different strategy which does not match with any other company.The employeesintheorganizations are being trained to support the data secrecy and the fundamental structure of the organization. The safety must be beyond the employees’ knowledge so that the employee has no idea of cracking it by covering logical and physical security. Information security is frequently subjected to metaphors. The information security must be targeted at global level by not letting the user know the problematic issues faced by the security department and also the logical security i.e. the sensitive data, applications and also the operating system used in a particular institute. The security must also be extended to telecommunication department of the institute so that they have a network security also. Data Leakage may take place at any time, there is no designated time. Data leakage rely onlyonthesignificanceof sharing information by the agent. The information distributed is consideredassensitivedata whenitconsistsof information about the client, budget, code and any design specification. If the leakage occurs, it leaves the institute in unprotected state. This data leakage places the institute or organizations in the state of uncertainty resulting in the decry of the business and eventually defeat of the company. Cloud computing security is growing in information security, computer security.Inmostcasesitisrecommended that based on the segment of risks security of data control to be choose and executed, by evaluating the vulnerabilities threats, and influences. The security concerns of the cloud can then be organized in different ways;Gartner[9]discover 14 regions of distress during the alliance of Cloud Security. Traditionally, Watermarking techniqueisusedtohandle data leakage detection. For instance, in every distributed copies a unique code is embedded using different types of watermarking algorithm. If this copyatlatertimeisfound by any unauthorized person, the personcan’tbeidentified. This result in the major drawback in watermarking technique. Though Watermarking technique is advantageous in real- time domain, yet again, few changes in the original information. In no time, if the recipient of the data is malicious, watermarks will be destroyed. Security is one of the most crucial aspects in cloud computing. Hence this prohibit the adoption of cloud computing. Hence, in this paper, we addressed the issue of security and performance. We proposed Division and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) this will break the owner’s files into various sections and replace them in the cloud space. The owner of the data decides the threshold value, based on this value fragments of a file is performed. So that the meaning full information is not held by the fragments. Any attack that is successful on any nodeshouldnothint the position of other fragments present within the cloud space. This in turn make the intruder cannot predict locations of file fragments so that it improves the security in the cloud. By using T-Coloring concept is usedtodothenode separation in order to select nodes in such a way that nodes
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 112 are not adjacent and are at obviousdistancefromeachother. Furthermore, the fragments storing in the nodes are placed with an obvious distance with the aid of graph T-Coloring in order to block an intruder from accessing the site of the fragments. 2. LITERATURE SURVERY Prashant Khobragade [8] [10] proposed that to detect the region where the attack has been taken place it is requiredto inspect data in the browser history. The inspected data is then brought together and put into database as a proof. The suggested method and forensic toolkit helps to analyze the data for the law enforcement. Sandip A. Kale, S.V. Kulkarni [2] focuses on robust watermarking technique, this technique will be useful in few cases, yet again, few modification of the original data is required. Moreover, watermarks will bedestroyedifthedata recipient is vengeful. The agent can add fake items to the spread data to improve the potency in finding criminal agents. Sushilkumar, B.Shinde, Archana. Bhosale [3], shows that in different institutes and organizations data leakage is spotted as the very serious and big challenge. They have further explained that sellers add fake information that is shared among the consumers in an attempt to increase the chance to detect criminal agents. This is detection of data leakage is then handled by an algorithm. Data leakage [7] [12] takes place in everyday life this happens when private business informationlikeinformation of consumer, technical code or design description, amount lists, intellectual property and secrets of trade and spreadsheets of budgetsareleaked.Whenthisinformationor data is dripped out it puts the company in the state of unprotected. This leads business in an unsafe position, Putting the company in serious risk due to data leakage. 3. EXISTING SYSTEM Water marking Technique: is a type of security technique which deals with the idea of embedding a particular code or encryption on the information that is to be distributed. The information can be image or a video or any official file. This encryption helps the company to claim the ownershiponany particular data. Water marking is a technique where a bit pattern is added to the data at a particular position on the tuples and subset of the data. The tuple and subset and their attributes are algorithmically coded in such a way that they are controlled by a key which can be accessed only by the owner. Fake Objects Method: this method causes less problems to the real objects by introducing fake objects in some applications. Consider an example, where hospitals are agents and medical records are distributed data items. Here in the records even the small change is undesirable. Still, the addition of fake information to the records will not affect as this data would notbematchinganypatientrecordandhence no patient would be treated on the basis of fake records injected. In this case, company A Company X sellsproductsto company Y a list to send advertisements be used once. Company X then injects trace data which contain addresses possess by company X. Thus, every time company Y purchases the product through list, company will receive a copies of the mails. This tracedataarefakeitemsthatenables to identify the misuse of data. 4. PROPOSED SYSTEM Detecting data leakage: The data owner first registered into the cloud account. Each and every user has to registered into the cloud. Now the data owner and user will become the authorized person. The data owner will upload the file into the cloud. Now the data owner login into the account, at that timethe cloud provider verifies the alreadyregisteredowner or not. If they are registered owner and then they will transfer the file to the users who have registered. The user can now login intotheiraccount,cloudprovideragainverifies the user. The user will download the file sent by the data owner. If someone try to copy the URL, the data get leaked in someone’s laptop. Now the details about the unauthorized person will be tracked. This tracked information sent as a mobile intimation to the data owner. The mobile intimation will hold information like IP address, MAC address and GPS location. Fig -1: Data Leakage Architecture
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 113 Drops Methodology: In DROPS methodology, we are not storing the entire file in cloudspace. Now weare splittingthe entire file into various fragments. These fragments have to distribute in the cloud space. Each and every fragment has to place in a particular node. So that each node contains only a single fragment. In each successful attack the node will not reveal the significant information. After the fragmentation process replication will takes place. In replication process, each fragment has to replicate its content once in the cloud space. In this way in the cloud computing we can achieve security. In DROPS methodology, data file is sent to the cloud space by the user. Cloud manager performs the following on file receiving: (1) File Fragmentation (2) Selecting Nodes (3) Fragment stores (4) Nodes selection for fragments replication. Fig -2: DROPS Methodology Drops Implementation File Fragmentation: In cloud, security is the major aspects for a large-scale system. Thisprovides the system securityas individual nodes and whole. On every successful action of intruding intosingle nodeit providesmoreresultoreffectfor data and other nodes. A successful intrusion may lead to software failure. It may also lead to administration defenseless. File fragmentation is a term that describes a group of files that are scattered throughout the cloud. The data owner splits the fileintovariouspiecescalledfragments. The size of fragmentation is decided by data owner using threshold value. In variousaspectsthethresholdvaluecanbe fixed, they are, 1. Decide percentage based on file size. 2. Numbering ofeachfragments.Forexample,firstfragmentthe file by 10% of total size or split the file by using various size like fragment 404MB, fragment 1000MB. It is alsopossibleto number the fragments like fragment1, fragment2 etc., The numbering of each fragments only known to the data owner. There are three types of fragmentation: 1. Horizontal. 2. Vertical. 3. Mixed (Hybrid). Fragment Placement: In ordertogivesecuritywhenputting the fragments in to the cloud, the T-coloring concept is essential.ChanneltaskproblemsmainlyusesT-Coloring.This will generatea positive number,randomnumber,tobuildthe set T by generating random number from zero as start. It assigns colors to the each and every node, in the beginning, all nodes will be in open color. The fragmentisthenplacedon particular node, all the nodes in the neighborhood are at certain distance which will be belonging to set T and these are allocate to close color. In this series of actions, this will lose few central nodes in cloud so that may rise time to retrieve. If anyhow the intruders try to track the node position and take the fragment, user cannot make out the precise location of other fragments.Theintruderendsupjust predicting thelocationofotherfragmentsincloud.Therefore, T-coloring concepts are used to separate the nodes. Fragment Copying/Reproducing: In replication process, unique copy exists and the same copy will exist once again. The replication process is used to elevate the availability of data and their by improve the time to retrieve. This carry out a controlled reproducing. In replicationprocess,copiesofthe samedata item have the same value. There are three types of replication, 1. No replication. 2. Fully replicated. 3. Partial replication. It positions the fragment on the node that gives the limited cost access. Hence improve the time to retrieve the access of the fragments and rebuilding of the original file. While reproducing the fragment, by T-coloring fragment separation is achieved, it also takes care of node placement. In instance of a large counts of fragments or small count of nodes, there is a possibility thatfewofthefragmentscouldbe left without being reproducing due to the use of T-coloring concepts. T-Coloring: T-coloring forbid keeping the fragment and also avoid storing a fragment in the node of a neighborhood, this results in eliminating the nodes that is used to retain. In such scenarios, where only the remaining fragments, those nodes are selected which are not possessing any fragments forrandom storage. T-coloring concept isappliedtoseparate nodes. The process of fragmentationmadesurenosuccessful information is obtained in successful attack. In the cloud, no nodestored the instances of samefile of single fragment.The DROPS methodology execution is compared with full-scale reproducingtechniques.Thisoutcomedrawstheattentionon the performance and security. This rise in the level of data security.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 114 DROPS methodology isproppedsecurityschemeinthecloud storage that deals with the performance and security that increase the time to retrieve. Data in the files were fragmented and these fragments are spreadovermultipleor many nodes. The fragmented file will be replicated their by increasing data availabilityandprovidesecuritytothecloud. The fragmented file will be replicated their by increasing data availability and provide security to the cloud. REFERENCES [1] Chandu Vaidya and Prashant Khobragade,2015, “Data Security in Cloud Computing”, ISSN: 2321-8169 . [2] Sandip A. Kale, Prof. S.V.Kulkarni,” Data Leakage Detection”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 9, November 2012. [3] Prof. Sushilkumar N. Holambe, Dr.Ulhas B.Shinde, Archana U. Bhosale,”data LeakageDetectionUsingCloud Computing ”, International Journal Of Scientific & Engineering Research, Volume 6, Issue 4,( April-2015). [4] P. Papadimitriou and H. GarciaMolina, “Data Leakage Detection,” technical report, Stanford Univ., 2008. [5] Hartung and kutter,.Watermarking technique for multimedia data.2003. [6] Priyanka Barge, Pratibha Dhawale,Namrata Kolashetti,” A Novel Data Leakage Detection”, International Journal of Modern Engineering Research (IJMER) ISSN: 2249- 6645, Vol.3, Issue.1, Jan-Feb. 2013. [7] Archana Vaidya, Prakash Lahange, Kiran More, Shefali Kachroo and Nivedita Pandey,”Data LeakageDetection”, International Journal of Advances in Engineering & Technology, ISSN: 2231-1963, March 2012. [8] Prashant Khobragade, Latesh G. Malik,“A Review on Data Generation for Digital Forensic Investigationusing Datamining”, IJCAT International Journal of Computing and Technology, Volume 1, Issue 3, April 2014. [9] Jon Brodkin, “Gartner: Seven cloud-computing security risks”. InfoWorld. 2008-07-02. Retrieved 2010-01-25. [10] Khobragade, P. K., & Malik, L. G., “Data Generation and Analysis for Digital Forensic Application Using Data Mining”. In Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on (pp. 458-462). IEEE. April, 2014. [11] Iqbal, C. Z. Xu, and A. Y. Zomaya, “Quantitative comparisons of the state of the art data center architectures,” Concurrency and Computation: Practice and Experience, Vol. 25, No. 12, 2013, pp. 1771-1783. [12] Chandu Vaidya etl. & BE scholars “Data leakage Detection and Dependable Storage Service in cloud Computing” IJSTE volume 2 issues 10 April 2016 ISSN online 2349-784X 5. CONCLUSION
Download now