Data Leakage Detection in Cloud Computing using Identity Services

Authors

  • Mythili K Department of CSA, Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya University, India
  • Rajalakshmi S Department of CSE , Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya University, India
  • Vidhya D Department of CSE , Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya University, India

Keywords:

Pay-As-You-Go, privacy and security, onetime password protection

Abstract

The emergence of cloud computing paradigm offers attractive and innovative computing services through resource pooling and virtualization techniques. It shifts the delivery and maintenance of software, databases and storage to the internet, transforming them into Pay-As-You-Go (PAYG) services, which accessed through a small business user’s web-browser. This technology introduces a new concern for enterprises and business organizations regarding their privacy and security. Security as a service in a cloud model integrates their security services into a corporate infrastructure. In corporate infrastructure it mainly concentrates on security systems developed to store and maintain documents over the cloud platform. The proposed work focused on the security platform to store and retrieve files on the cloud with onetime password protection. The main contribution of this research is to authenticate file while uploading and downloading from server with onetime password protection. The files are distributed to the employees of an organization by administrator and it can be downloaded by user with onetime password protection. This feature helps to secure the data before viewed by user or any unauthorized user who is act as a third party to that organization.

References

Papadimitriou P and Garcia-Molina, “Data Leakage Detection” Knowledge and Data Engineering, IEEE Transactions on Volume: 23, Issue: 1, Page No (51-63), Jan 2011.

Michael Miller, “Cloud Computing - Web-Based Applications that change the way you work and Collaborate Online” , Pearson Education, 2012 .

Kumar Ajay, Goyal Ankit, Kumar Ashwani, Chaudhary Navneet Kumar and Sowmya Kamath, “Comparative evaluation of algorithms for effective data leakage detection”, Information & Communication Technologies (ICT), 2013 IEEE Conference, ISBN 978-1-4673-5759- 3, Page No(177-182), April 11-12, 2013.

Chandni Bhatt et al, “Data Leakage Detection”, International Journal of Computer Science and Information Technologies, 2014

Ankit Tale, Mayuresh Gunjal and B.A. Ahire, “Data Leakage Detection Using Information Hiding Techniques”, International Journal of Computer Sciences and Engineering, E-ISSN : 2347 - 2693, Volume-2, Issue-3 Page No (155-158), March - 2014.

Downloads

Published

2025-11-11

How to Cite

[1]
K. Mythili, S. Rajalakshmi, and D. Vidhya, “Data Leakage Detection in Cloud Computing using Identity Services”, Int. J. Comp. Sci. Eng., vol. 4, no. 4, pp. 59–63, Nov. 2025.

Issue

Section

Research Article