This paper is published in Volume-4, Issue-2, 2018
Area
Cloud Computing
Author
Niketa Kirdat, Nilima Mokal, Juhi Mokal, Aishwarya Parkar, R. V. Shahabade
Org/Univ
Terna Engineering College, Navi Mumbai, Maharashtra, India
Keywords
Watermarking, Data leakage, Fake Object, Blowfish Algorithm, AES Algorithm.
Citations
IEEE
Niketa Kirdat, Nilima Mokal, Juhi Mokal, Aishwarya Parkar, R. V. Shahabade. Data Leakage Detection and File Monitoring in Cloud Computing, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Niketa Kirdat, Nilima Mokal, Juhi Mokal, Aishwarya Parkar, R. V. Shahabade (2018). Data Leakage Detection and File Monitoring in Cloud Computing. International Journal of Advance Research, Ideas and Innovations in Technology, 4(2) www.IJARIIT.com.
MLA
Niketa Kirdat, Nilima Mokal, Juhi Mokal, Aishwarya Parkar, R. V. Shahabade. "Data Leakage Detection and File Monitoring in Cloud Computing." International Journal of Advance Research, Ideas and Innovations in Technology 4.2 (2018). www.IJARIIT.com.
Niketa Kirdat, Nilima Mokal, Juhi Mokal, Aishwarya Parkar, R. V. Shahabade. Data Leakage Detection and File Monitoring in Cloud Computing, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Niketa Kirdat, Nilima Mokal, Juhi Mokal, Aishwarya Parkar, R. V. Shahabade (2018). Data Leakage Detection and File Monitoring in Cloud Computing. International Journal of Advance Research, Ideas and Innovations in Technology, 4(2) www.IJARIIT.com.
MLA
Niketa Kirdat, Nilima Mokal, Juhi Mokal, Aishwarya Parkar, R. V. Shahabade. "Data Leakage Detection and File Monitoring in Cloud Computing." International Journal of Advance Research, Ideas and Innovations in Technology 4.2 (2018). www.IJARIIT.com.
Abstract
In the virtual and cosmopolitan network, the method of redeeming sensitive information from the distributor to the trusty third parties continually happens frequently during this times. It is important to safeguard the security and durability of service based on the demand of users. In the present scenario, the transfer of data is an important thing for one user to another. Data is mainly sent by the distributors which are generally the owner of data to the user which wants the information. The information sent by the distributor must be confidential and must be shared by a secure way. Sometimes during sharing of data, multiple copies of information are generated by different parties which cause a huge amount of loss, this is known as data leakage. To prevent this escape of information one should place measures so as to discover the escape in associate early stage. When a user downloads a file, shares or views the file notification will be provided to the owner through email. When a user downloads or shares the file the date and time will also be recorded and log files will be maintained.