Open Access   Article Go Back

Data Leakage Detection in Cloud Computing using Identity Services

K. Mythili1 , S. Rajalakshmi2 , D. Vidhya3

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-4 , Page no. 59-63, Apr-2016

Online published on Apr 27, 2016

Copyright © K. Mythili, S. Rajalakshmi , D. Vidhya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K. Mythili, S. Rajalakshmi , D. Vidhya, “Data Leakage Detection in Cloud Computing using Identity Services,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.59-63, 2016.

MLA Style Citation: K. Mythili, S. Rajalakshmi , D. Vidhya "Data Leakage Detection in Cloud Computing using Identity Services." International Journal of Computer Sciences and Engineering 4.4 (2016): 59-63.

APA Style Citation: K. Mythili, S. Rajalakshmi , D. Vidhya, (2016). Data Leakage Detection in Cloud Computing using Identity Services. International Journal of Computer Sciences and Engineering, 4(4), 59-63.

BibTex Style Citation:
@article{Mythili_2016,
author = {K. Mythili, S. Rajalakshmi , D. Vidhya},
title = {Data Leakage Detection in Cloud Computing using Identity Services},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2016},
volume = {4},
Issue = {4},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {59-63},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=858},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=858
TI - Data Leakage Detection in Cloud Computing using Identity Services
T2 - International Journal of Computer Sciences and Engineering
AU - K. Mythili, S. Rajalakshmi , D. Vidhya
PY - 2016
DA - 2016/04/27
PB - IJCSE, Indore, INDIA
SP - 59-63
IS - 4
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1529 1490 downloads 1383 downloads
  
  
           

Abstract

The emergence of cloud computing paradigm offers attractive and innovative computing services through resource pooling and virtualization techniques. It shifts the delivery and maintenance of software, databases and storage to the internet, transforming them into Pay-As-You-Go (PAYG) services, which accessed through a small business user’s web-browser. This technology introduces a new concern for enterprises and business organizations regarding their privacy and security. Security as a service in a cloud model integrates their security services into a corporate infrastructure. In corporate infrastructure it mainly concentrates on security systems developed to store and maintain documents over the cloud platform. The proposed work focused on the security platform to store and retrieve files on the cloud with onetime password protection. The main contribution of this research is to authenticate file while uploading and downloading from server with onetime password protection. The files are distributed to the employees of an organization by administrator and it can be downloaded by user with onetime password protection. This feature helps to secure the data before viewed by user or any unauthorized user who is act as a third party to that organization.

Key-Words / Index Term

Pay-As-You-Go, privacy and security, onetime password protection

References

[1] Papadimitriou P and Garcia-Molina, “Data Leakage Detection” Knowledge and Data Engineering, IEEE Transactions on Volume: 23, Issue: 1, Page No (51-63), Jan 2011.
[2] Michael Miller, “Cloud Computing - Web-Based Applications that change the way you work and Collaborate Online” , Pearson Education, 2012 .
[3] Kumar Ajay, Goyal Ankit, Kumar Ashwani, Chaudhary Navneet Kumar and Sowmya Kamath, “Comparative evaluation of algorithms for effective data leakage detection”, Information & Communication Technologies (ICT), 2013 IEEE Conference, ISBN 978-1-4673-5759- 3, Page No(177-182), April 11-12, 2013.
[4] Chandni Bhatt et al, “Data Leakage Detection”, International Journal of Computer Science and Information Technologies, 2014
[5] Ankit Tale, Mayuresh Gunjal and B.A. Ahire, “Data Leakage Detection Using Information Hiding Techniques”, International Journal of Computer Sciences and Engineering, E-ISSN : 2347 - 2693, Volume-2, Issue-3 Page No (155-158), March - 2014.