This document proposes a method for detecting data leakage using cloud computing. It discusses how data leakage occurs, different techniques for protecting data, and a proposed methodology. Specifically, it presents an algorithm for allocating data to agents in a way that maximizes the ability to detect which agent leaked the data if a leak occurs. The algorithm takes agents' data requests as input and allocates real and fake data to the agents while aiming to minimize overlap between the agents' data sets.