Friday, January 3, 2020

Data Leakage Detection System For Cloud Based Storage Systems

Data Leakage Detection System for Cloud-based Storage Systems K.Haritha+ M.HariPrasad+ D.LakshmiTeja + CH.ManiTeja+ *G. Rajesh Chandra *Assistant professor, Department of Electronics and Computer Engineering, K L University, India. B Tech, Department of Electronics and Computer Engineering, K L University, India Abstract: In this age of cloud computing the incidences of theft/leakage of valuable, sensitive data is on the rise. Data security has gained greater significance than ever before. This paper attempts to deal with the problem of data leakage and its detection, a rising phenomenon especially in big organizations. We are all too familiar with stories of data loss from laptop theft, hacker break-ins, and backup tapes being lost or stolen, and so on. It is possible only by Data Leakers, who usually are authorized persons. The identification of the Data Leaker is very big task. In the past methods such as Watermarking and fake data addition were used to identify leakers. But in such methods reliability, consistency is very low and largely incompetent in the present age. Thus a sophisticated system to confront such activities with reasonable competence is highly essential. This paper proposes a highly effective system employing various techniques to cleverly detect data leakage and the le akers. Keywords: Watermarking, Guilty party, Forged Data. 1.Show MoreRelatedCloud Computing Is Becoming The Most Popular Topic1693 Words   |  7 Pages Cloud computing is becoming the most popular topic in the realm of Information technology. Its popularity stems from the ability to allow with limited knowledge, to be able to access their information anytime and anywhere while reducing overhead and costs. Additionally, reduces the need for backups; this is because backups are done automatically, between different servers in the â€Å"cloud†. Even with the obscurity, cloud computing is really just a way to outsource computing resources, and have a thirdRead MoreThe Reliability Of Cloud Computing Essay1660 Words   |  7 PagesReliability Studies have been done in assessing the reliability of cloud computing. However, the number of studies on fog computing and its reliability are relatively lower in number. Researchers have also identified problems in terms of the methods and approaches used for assessing reliability. Research has shown that reliability can be improved through checking and rechecking the failure of networks, rescheduling the launching of failed tasks and through integrating advanced technologies and measuresRead MoreSecurity Issues Of Cloud Computing Essay1512 Words   |  7 PagesStatement: The problem statement of report denotes the security issues in Cloud infrastructure accentuating as major constraints in the adoption of the technology. With the sophistication of the cyber attacks, the security infrastructure of cloud does not promise the expected robustness and efficiency in order to prevent the different kinds of threats and attacks. Hence the report shall deal with the security issues of Cloud and how must it be addressed in order to ensure the technology’s adoptionRead MoreAdvantage And Challenges Of Cloud Computing1010 Words   |  5 PagesAdvantage and Challenges of Cloud Computing Background The evolution of Information Technology is inevitable, not only on the telecommunication and networking industry, but, it is also gaining more popularity in the business industry by way of Enterprise Resource Planning (ERP) system and rapidly making its move towards the accounting and auditing industry through Data Analytics Software, however, as the IT innovation continues and the concern of capacity and storage progress, and the demand forRead MoreAnalysis Of Cloud Computing And Cyber Security1695 Words   |  7 Pages CLOUD COMPUTING AND NETWORK SECURITY ISSUES(Z5140305) Executive Summary In this fast-paced technology era, organizations are always looking for new innovative ways to increase productivity and efficiency. One emerging technology adopted by many organisations is cloud computing. Cloud computing is a model that uses internet and remote servers for maintaining data and applications (Association of Modern Technologies Professionals 2017). It replaces expensive infrastructure and need of maintenanceRead MoreCloud Computing Case Study1078 Words   |  5 PagesCloud computing is the collective use of remote servers to handle data, rather than having a local server/computer handling the data. Cloud services provide a lot of convenience to businesses and personal use, because it alleviates the need for costly personal servers/ server maintenance. The issue with implementing this into a business, however, is the dependence on another company’s servers. It also faces security issues such as: lack of direct, physical control over the servers the company uses Read MoreThe Data Loss Prevention Approach2136 Words   |  9 PagesData Loss Prevention Approach A success of DLP strategies can be achieved by not just mitigating data loss risk or Data breaches incidence, but actually involving people, process and technology in it by educating and managing employee’s behavior, planning policies and enforcing it via appropriate technology [4]. Strategies/approaches for DLP implementation is broadly classified in three categories according to the place where it is implemented. Figure 1 DLP approaches [6] 1. Network focused (aRead MoreRun Public Auditing Of Cloud Computing Using Protocol Blocker For Privacy Essay1775 Words   |  8 Pagesin Cloud Computing Using Protocol Blocker for Privacy Babita Baghat (Computer Engineering) Dhanashri Patil (Computer Engineering) Abstract - Cloud Computing is huge computing, it is the internet based computing, where all users can remotely store their data into the cloud so as to enjoy the latest and high quality applications and services. In outsourcing data , users can be relieved from the burden of local maintenance and data storage .Thus, enabling public auditability for cloud data storageRead MoreDetermining The Cloud Computing And Compliance Issues1758 Words   |  8 PagesDetermining the cloud computing and compliance issues Organizations and Infrastructures are moving towards cloud computing technologies because of what it has to offer, i.e scalability, cost reduction and new service offerings. Though Cloud computing seems to be like a shiny objects that attract business organizations; the issues that needs to be addressed are compliance issues. Tackling all security and compliance issues that come up in this dynamic environment seems daunting unless you boil theRead MoreCloud Computing3770 Words   |  16 PagesTop Threats to Cloud Computing V1.0 Prepared by the Cloud Security Alliance March 2010 Top Threats to Cloud Computing V1.0 Introduction The permanent and official location for the Cloud Security Alliance Top Threats research is: http://www.cloudsecurityalliance.org/topthreats  © 2010 Cloud Security Alliance. All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud Security Alliance â€Å"Top Threats to Cloud Computing† at http://www

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.