Data Leakage Detection in Cloud Computing using Identity Services
Keywords:
Pay-As-You-Go, privacy and security, onetime password protectionAbstract
The emergence of cloud computing paradigm offers attractive and innovative computing services through resource pooling and virtualization techniques. It shifts the delivery and maintenance of software, databases and storage to the internet, transforming them into Pay-As-You-Go (PAYG) services, which accessed through a small business user’s web-browser. This technology introduces a new concern for enterprises and business organizations regarding their privacy and security. Security as a service in a cloud model integrates their security services into a corporate infrastructure. In corporate infrastructure it mainly concentrates on security systems developed to store and maintain documents over the cloud platform. The proposed work focused on the security platform to store and retrieve files on the cloud with onetime password protection. The main contribution of this research is to authenticate file while uploading and downloading from server with onetime password protection. The files are distributed to the employees of an organization by administrator and it can be downloaded by user with onetime password protection. This feature helps to secure the data before viewed by user or any unauthorized user who is act as a third party to that organization.
References
Papadimitriou P and Garcia-Molina, “Data Leakage Detection” Knowledge and Data Engineering, IEEE Transactions on Volume: 23, Issue: 1, Page No (51-63), Jan 2011.
Michael Miller, “Cloud Computing - Web-Based Applications that change the way you work and Collaborate Online” , Pearson Education, 2012 .
Kumar Ajay, Goyal Ankit, Kumar Ashwani, Chaudhary Navneet Kumar and Sowmya Kamath, “Comparative evaluation of algorithms for effective data leakage detection”, Information & Communication Technologies (ICT), 2013 IEEE Conference, ISBN 978-1-4673-5759- 3, Page No(177-182), April 11-12, 2013.
Chandni Bhatt et al, “Data Leakage Detection”, International Journal of Computer Science and Information Technologies, 2014
Ankit Tale, Mayuresh Gunjal and B.A. Ahire, “Data Leakage Detection Using Information Hiding Techniques”, International Journal of Computer Sciences and Engineering, E-ISSN : 2347 - 2693, Volume-2, Issue-3 Page No (155-158), March - 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
