Data Leakage Detection Using Cloud Computing

Authors

  • Zakiya Banu Student, Department of Computer Science and Engineering, Ramaiah Institute of Technology, Bangalore, India
  • Chandrika Prasad Assistant Professor, Department of Computer Science and Engineering, Ramaiah Institute of Technology, Bangalore, India

Keywords:

data leak, leaks, guilty agents

Abstract

Data leakage refers to the unintentional or accidental disclosure of confidential or sensitive information to unauthorized individuals or entities. This poses a significant challenge for businesses, as the frequency and costs associated with data leakage incidents continue to rise. The issue of data leakage is compounded by the lack of regulation and monitoring for transmitted data, including emails, instant messaging, file transfers, and web forms. This makes it difficult to track and control the flow of data to its intended recipients. In our research, we focus on a specific problem: a data distributor entrusts sensitive data to a group of agents who are deemed trustworthy. However, some of the data is leaked and found in unauthorized locations, such as the internet or unauthorized devices. The distributor must assess the probability that the leaked data originated from one or more of the entrusted agents, rather than being obtained independently through other means. To address this challenge, we propose data allocation strategies among the agents that aim to improve the likelihood of identifying data leakages. Importantly, our methods do not rely on modifying the released data through techniques like watermarks. In certain cases, we also explore the possibility of introducing realistic but fabricated data records to further enhance our ability to detect leaks and identify the responsible party.

Downloads

Download data is not yet available.

Downloads

Published

16-06-2023

Issue

Section

Articles

How to Cite

[1]
Z. Banu and C. Prasad, “Data Leakage Detection Using Cloud Computing”, IJRAMT, vol. 4, no. 6, pp. 54–57, Jun. 2023, Accessed: Sep. 08, 2024. [Online]. Available: https://journals.ijramt.com/index.php/ijramt/article/view/2747