Enhancement of Data Leakage Detection Using Encryption Technique

Authors

  • Monali U. Pawar  Navsahadri Education Society's Group of Institutions, Pune, Maharashtra, India
  • Shraddha A. Mankar  Navsahadri Education Society's Group of Institutions, Pune, Maharashtra, India
  • Snehal S. Mandhare  Navsahadri Education Society's Group of Institutions, Pune, Maharashtra, India
  • Siddhi N. More  Navsahadri Education Society's Group of Institutions, Pune, Maharashtra, India
  • Rashmi R. Patil  Navsahadri Education Society's Group of Institutions, Pune, Maharashtra, India

Keywords:

Data leakage, Ram usage, Data usage.

Abstract

In the field of information technology data is crucial and sensitive part and it cause serious threat if it leaked. Now a day's huge amount of data is occurred and it requires to be maintained so peoples generally prefer cloud to store their data. Because one can access it from anywhere anytime and it contains huge amount of information and it provides numerous services to huge number of peoples. Statistics shows that lack of information encryption due to human mistakes can lead data loss. The advantages of cloud computing are Reduced Data Leakage, Decrease evidence acquisition time, they eliminate service downtime, they Forensic readiness, they decrease evidence transfer time the main factor to be discussed is security of cloud computing, which is a risk factor involved in major computing fields. So we aim to propose system to achieve highest security of data on cloud. So we proposed a new framework and an Encryption Schemes which encrypt the data and retrieve the data efficiently.

References

  1. Data Leakage Detection, Panagiotis Papadimitriou, Student Member, IEEE, and Hector Garcia-Molina, Member, IEEE,
  2. A novel data leakage detection, Priyanka Barge, Pratibha Dhawale, Namrata Kolashetti3 Ass. Prof., Department of Computer Engineering, NIRMALA CHOUHAN International Journal of Modern Engineering Research (IJMER) Vol.3, Issue.1, Jan-Feb. 2013 pp-538-540 ISSN: 2249-6645
  3. Data leakage detection, Sandip A. Kale, Prof. S.V.Kulkarni Department Of CSE, MIT College of Engg, Aurangabad, Dr. B. A. M. University , Aurangabad (M.S), India International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 9, November 2012
  4. Network security using cryptographic techniques, Sumedha Kaushik, Ankur Singhal, Department of ECE & M.M. university Ambala (Haryana) India, volume 2, issue 12, December 2012, ISSN:2277 128X
  5. Information Hiding in Images Using Steganography Techniques Ramadhan Mstafa, Christian Bach 2013 ASEE Northeast section conference, Norwich university, reviewed paper, March 14-16, 2013
  6. Digital forencis and Preservation, Jeremy Leighton John, DPC technology watch report 12-03 November 2012.
  7. Steganography and its application security, Ronak Doshi, Pratik Jain, Lalit Gupta, Department of Electronics and Telecommunication, Pune University, India.
  8. Mr.V.Malsoru, Naresh Bollam / REVIEW ON DATA LEAKAGE DETECTION , International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 1, Issue 3, pp.1088-1091 1088.
  9. R. Sion, M. Atallah, and S. Prabhakar, •\Rights Protection for Relational Data, Proc. ACM SIGMOD, pp. 98-109, 2003.
  10. Hartung and kutter,. Watermarking technique for multimedia data.2003.
  11. L. Sweeney, ?Achieving K-Anonymity Privacy Protection Using Generalization and Suppression, http://en.scientificcommons.org/43196131, 2002.
  12. Patil .R.Rashmi and S. M. Sangve, "Public auditing system: Improved remote data possession checking protocol for secure cloud storage," 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Davangere, 2015, pp. 75-80.

Downloads

Published

2019-05-30

Issue

Section

Research Articles

How to Cite

[1]
Monali U. Pawar, Shraddha A. Mankar, Snehal S. Mandhare, Siddhi N. More, Rashmi R. Patil, " Enhancement of Data Leakage Detection Using Encryption Technique, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 6, Issue 3, pp.10-16, May-June-2019.