Data leakage Detection and Security in Cloud Computing
Journal: GRD Journal for Engineering (Vol.1, No. 12)Publication Date: 2016-11-01
Authors : Chandu Vaidya; Prashant Khobragade; Ashish Golghate;
Page : 137-140
Keywords : Data Leakage; Cloud Computing; data Security; SHA; Third Party Agent; Fake Object;
Abstract
Data leakage ad security of data is an essential component of cloud computing, most of the data has been proceed through third party application (TPA) and user are unaware about the security essentials. The internet based computing model provide shared resource to provide data on demand, such model provide service over the internet with computing resources. The TPA who expertise and provide crossing point between the user and the cloud service provider who facilitate service between them, the data store over cloud is passes through TPA in plain text and then it encrypted using the third party application. It might be possible that data can easily leaked over the internet, in this paper the proposed approach is to detect when the distributor's sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data. Perturbation is a very useful technique where the data is modified and made less sensitive before being handed to agents and encryption algorithm SHA provide security of sensitive data before uploading over the internet cloud. The proposed model also provide security of data before uploading through TPA and after successfully upload data the secret key is shared with original user without intercepting TPA.
Citation : Chandu Vaidya , Rajiv Gandhi College of Engineering and Research, Nagpur; Prashant Khobragade ,RGCER Nagpur ; Ashish Golghate ,RGCER Nagpur . "Data leakage Detection and Security in Cloud Computing ." Global Research and Development Journal For Engineering 112 2016: 137 - 140.
Other Latest Articles
- Multi-domain Collaborative Reputation Evaluation Mechanism Based on SFLA for IOT
- Microcontroller based vehicle alert system using RFID and GSM technology for RTO application
- A Framework for Assessing Cloud Computing Security for Cloud Adoption in Microfinance Banks
- Survey on Network Coding-aware Routing
- Blind Adaptive Transmitted Reference Receiver Based on Indoor Wireless Propagation
Last modified: 2016-12-13 03:26:49