Data leakage Detection and Security in Cloud Computing

Chandu Vaidya , Rajiv Gandhi College of Engineering and Research, Nagpur; Prashant Khobragade ,RGCER Nagpur ; Ashish Golghate ,RGCER Nagpur

Data Leakage, Cloud Computing, data Security, SHA, Third Party Agent, Fake Object

Data leakage ad security of data is an essential component of cloud computing, most of the data has been proceed through third party application (TPA) and user are unaware about the security essentials. The internet based computing model provide shared resource to provide data on demand, such model provide service over the internet with computing resources. The TPA who expertise and provide crossing point between the user and the cloud service provider who facilitate service between them, the data store over cloud is passes through TPA in plain text and then it encrypted using the third party application. It might be possible that data can easily leaked over the internet, in this paper the proposed approach is to detect when the distributor’s sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data. Perturbation is a very useful technique where the data is modified and made less sensitive before being handed to agents and encryption algorithm SHA provide security of sensitive data before uploading over the internet cloud. The proposed model also provide security of data before uploading through TPA and after successfully upload data the secret key is shared with original user without intercepting TPA.
    [1] Chandu Vaidya and Prashant Khobragade,2015, “Data Security in Cloud Computing”, ISSN: 2321-8169 . [2] Sandip A. Kale, Prof. S.V.Kulkarni,” Data Leakage Detection”, International Journal of Advanced Research in Computer and Communication Engineering,Vol. 1, Issue 9, November 2012 [3] Prof. Sushilkumar N. Holambe, Dr.Ulhas B.Shinde, Archana U. Bhosale,”data Leakage Detection Using Cloud Computing ”, International Journal Of Scientific & Engineering Research, Volume 6, Issue 4,( April-2015) [4] Ms. N. Bangar Anjali, Ms. P. Rokade Geetanjali, Ms. Patil Shivlila, Ms. R. Shetkar Swati,Prof.NB Kadu,” DATA LEAKAGE DETECTION”, IJCSMC, ISSN 2320–088XVol. 2, Issue. 5, May 2013 [5] Anusha Koneru, G. Siva Nageswara Rao, J.Venkata Rao,” Data Leakage Detection Using Encrypted Fake Objects”, IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.3, March 2014 [6] Priyanka Barge, Pratibha Dhawale, Namrata Kolashetti,” A Novel Data Leakage Detection”, International Journal of Modern Engineering Research (IJMER) ISSN: 2249-6645 ,Vol.3, Issue.1, Jan-Feb. 2013 [7] Archana Vaidya, Prakash Lahange, Kiran More, Shefali Kachroo and Nivedita Pandey,” Data Leakage Detection”, International Journal of Advances in Engineering & Technology, ISSN: 2231-1963, March 2012. [8] Prashant Khobragade, Latesh G. Malik,“A Review on Data Generation for Digital Forensic Investigation using Datamining”, IJCAT International Journal of Computing and Technology, Volume 1, Issue 3, April 2014. [9] Jon Brodkin, "Gartner: Seven cloud-computing security risks". InfoWorld. 2008-07-02. Retrieved 2010-01-25. [10] Khobragade, P. K., & Malik, L. G., “Data Generation and Analysis for Digital Forensic Application Using Data Mining”. In Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on (pp. 458-462). IEEE. April, 2014. [11] Panagiotis Papadimitriou, Hector Garcia-Molina,” Data Leakage Detection”, IEEE transactions on knowledge and data engineering, vol. 23, no. 1, January 2011 [12] Chandu Vaidya etl. & BE scholars “Data leakage Detection and Dependable Storage Service in cloud Computing” IJSTE volume 2 issues 10 April 2016 ISSN online 2349-784X
Paper ID: GRDJEV01I120082
Published in: Volume : 1, Issue : 12
Publication Date: 2016-12-01
Page(s): 137 - 140