Data leakage Detection and Security in Cloud Computing

Journal Title: GRD Journal for Engineering - Year 2016, Vol 1, Issue 12

Abstract

Data leakage ad security of data is an essential component of cloud computing, most of the data has been proceed through third party application (TPA) and user are unaware about the security essentials. The internet based computing model provide shared resource to provide data on demand, such model provide service over the internet with computing resources. The TPA who expertise and provide crossing point between the user and the cloud service provider who facilitate service between them, the data store over cloud is passes through TPA in plain text and then it encrypted using the third party application. It might be possible that data can easily leaked over the internet, in this paper the proposed approach is to detect when the distributor’s sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data. Perturbation is a very useful technique where the data is modified and made less sensitive before being handed to agents and encryption algorithm SHA provide security of sensitive data before uploading over the internet cloud. The proposed model also provide security of data before uploading through TPA and after successfully upload data the secret key is shared with original user without intercepting TPA.

Authors and Affiliations

Chandu Vaidya, Prashant Khobragade, Ashish Golghate

Keywords

Related Articles

Design of 8-Bit Full Adder Based On Spin Transfer Torque Magnetic Tunnel Junction

In conventional technology, CMOS logic circuits are used. This technology suffer from high power issues due to long traffic delay and leakage current. After that, Hybrid logic-in memory architecture using Magnetic Tunnel...

Eco Engineered Remedy for Water Pollution Using Artificial Floating Island

In recent years, water pollution has become one of the most serious environmental problems. The Mula, Mutha and Pavana rivers, flowing through the Pune City and Pimpri-Chinchwad industrial area, are polluted with untreat...

Enhanced Elliptic Curve Diffie-Hellman Key Exchange Algorithm for Ornamental Security based on Signature and Authentication Algorithm

In today's period of the invasive figuring, the Internet has turned into the principle method of information correspondence. In such a situation, giving security to information turns into a mind boggling assignment. In E...

Developing an Innovative Approach for Enhancing Employability Skills of Civil Engineers

Present times approve supplemented universal industrial segment request for Civil Engineers; following expansion of Civil Engineering stages, producing extra talented ex-students. Countless establishments have regularly...

Applications of Google Glass-Review

Google Glass is a brand of smart glasses - an optical head-mounted display designed in the shape of a pair of eyeglasses. It was developed by X (previously Google X) with the mission of producing a ubiquitous computer. I...

Download PDF file
  • EP ID EP220956
  • DOI -
  • Views 87
  • Downloads 0

How To Cite

Chandu Vaidya, Prashant Khobragade, Ashish Golghate (2016). Data leakage Detection and Security in Cloud Computing. GRD Journal for Engineering, 1(12), 137-140. https://europub.co.uk/articles/-A-220956