Data Leakage Detection System for Cloud-based Storage Systems K.Haritha+ M.HariPrasad+ D.LakshmiTeja + CH.ManiTeja+ *G. Rajesh Chandra *Assistant professor, Department of Electronics and Computer Engineering, K L University, India. B Tech, Department of Electronics and Computer Engineering, K L University, India Abstract: In this age of cloud computing the incidences of theft/leakage of valuable, sensitive data is on the rise. Data security has gained greater significance than ever before. This paper attempts to deal with the problem of data leakage and its detection, a rising phenomenon especially in big organizations. We are all too familiar with stories of data loss from laptop theft, hacker break-ins, and backup tapes being lost or stolen, and so on. It is possible only by Data Leakers, who usually are authorized persons. The identification of the Data Leaker is very big task. In the past methods such as Watermarking and fake data addition were used to identify leakers. But in such methods reliability, consistency is very low and largely incompetent in the present age. Thus a sophisticated system to confront such activities with reasonable competence is highly essential. This paper proposes a highly effective system employing various techniques to cleverly detect data leakage and the leakers. Keywords: Watermarking, Guilty party, Forged Data. 1.
Cloud computing facilitates sharing of computing and storage resources with the aim of reducing computing expenses in organizations. Moreover, cloud computing facilitates information sharing among individuals within a cloud. Despite being advantageous, data stored in a cloud is usually prone to hacking and other security issues. This paper addresses the various mitigation measures that organizations are using to ensure that data stored in the cloud is secure.
As computer technologies are rapidly growing everyday, hackers are also more sophisticated. We used to know that hackers could easily compromise out PC and access to our personal information. Today, they have capabilities to hack corporations’ network systems. The combination of the cloud and large data increase more international data breaches. Based on data from the Identity
The world of cyber security continues to introduce new threats each year against network infrastructures and computer devices. In the recent years, the impact from cyber-attacks has wreaked havoc on many company brands and organizational reputations. As this issue grows so does the technology to prevent and protect against these malicious attacks. It is absolutely crucial for organizations and businesses to shift focus from defense for different types of attacks to improving safeguards to mitigate the loss of sensitive data when an attack occurs. In addition to the traditional security technology used to detect an attack, companies will have to include
In today’s modern society, to which a well-developed information technology has been applied, it is getting more and more inevitable to use it in our everyday life, since people can store and access to their private information in one place without difficulty. However, this is also the danger of it, as it has become much easier for a third-party to collect and steal information online. Consequently, many cautious company and institutions are aware and well prepared for the potential cyber data hack attacks. (Bennett, 1992)
We would like to provide the benefits of cloud computing without any troubles to propel in the direction it is designed for. This is to be achieved by preventing the owner's data from all risks associated and providing a cloud model that is more secure and efficient. The proposed model shall overcome the security risks defined by the security functions over cloud computing, as follows in (Passent M. et al., 2015):
We are living in the world where we are required to yield our personal data information to authority or companies such as names, date of birth, social security number or even credit numbers (Magalhaes, 2012). We may be aware that the personal data can expose to unauthorized people if our data is not secure properly, either via wire or wireless network. Lost or stolen data has been seen while data is transferred between different users using both networks. Can we trust companies to keep our data safe from being lost or misuse? Yes, we can. With new cyber-crime laws are enforced, it is in the company's best interest to keep their customers' data more secure (Magalhaes, 2012). This article will summarize the major security risks and threats to
Data is often the most valuable asset possessed by an organization and it is the main target of intentional attacks. Data stored, processed, and transmitted by a computer system must be protected. Business organizations use the internet as an important aspect of their business model. In addition to using internet applications, such as the web and email, to generate revenue and communicate with customers, they also store important and proprietary information on computers that are accessible
In 2013, technology giant Adobe Corporation faced the biggest security disaster in its history; computer hackers stole three million customer credit card records including source codes from various Adobe products. This disaster shows what may happen to technology companies and how they may face reputational challenge as well as financial risk if computer system is not secured. Security disasters between Adobe and cloud computing environments have numerous differences. Security disasters in cloud computing environments can destroy all of the user data which can eventually destroy the business of that particular company. Cloud computing extends the context of technology beyond the imagination; it can be described as a large number of connected computers which can be accessed through the internet which has numerous benefits, such as storing data, collaborating with a team, saving time and saving money. As technological business is evolving rapidly, security concerns become the biggest headache for corporate leaders and also become a large area to research. Eventually, most of the corporate data centers are being replaced by this new computing environment and have become a most cost effective enterprise computer network for all kinds of users from corporate to personal. An increased number of cloud computing networks have huge security challenges. Giant technology companies like Microsoft, Google, and Amazon are aware of the transition of cloud computing environment and
Imagine massive server failures that not only lead to complete data loss, but also a financial crisis for customers. This is the problem that Lloyds Banking Group faced when servers failed and left thousands of customers without access to their accounts according to Clarke (2014). In order to protect firm data, firm reputation, and especially customer trust and loyalty, Bank of America needs to assure proper precautions are taken to securely store all data.
This section of paper includes why we need cloud computing as a security control tool against the cyber criminal activities and in how many ways it can be implemented. As we are living in a technical era, many aspects of our lives rely on the Internet and computers, including transportation, communications, government, medicine, finance and education. Consider how much of our personal information is stored either on our own computer or on someone else’s system.
From the viewpoint of data security, which has always been an important form of quality of service, Cloud computing surely poses new challenging security threats for number of reasons. Firstly, traditional cryptographic primitives for the purpose of data security protection cannot be straight accepted due to users loss control of data under cloud computing. Therefore, verification of correct data storage in the cloud must be attended without accurate knowledge of the whole data. Considering different kind of data for every user stored in the cloud and the requirement of long term continuous security of their data safety, the problem of checking correctness of data storage in the cloud becomes even more challenging.[1]
Cloud computing has become so famous; there is much widespread news about the cloud these days. This is mainly because of the exponential shift of the business applications from traditional models of software towards the Internet, and now through mobile devices. Cloud computing is a model that uses the network of remote servers that has been hosted on the internet rather than on a specific hardware. This would enable a better shared pool for storing, accessing and processing of data. With the huge information being available in the internet, the security for cloud computing has been challenging and this paper would elucidates the security threats of cloud computing also stating the possible countermeasures for them.
Cloud computing environment fundamentally facilitate two basic functions: computing and data storage. Data security remains an issue in the use of ICT, but in the cloud computing environment, it becomes even more worrying issue for its users, because cloud services are delivered over the internet and are provided by large scale data centres. The cloud data centres can be located anywhere in the world, and consumers’ usually have little or no control over how it is stored and managed. Cloud technology is increasingly adopted by companies as it has enormous benefits as well as draw backs. This study analyses security issues within cloud computing environment particularly focuses on privacy and issues regarding data security, how could cloud data in cloud be made more secure and explores various data security solutions and techniques.
Almost all kind of large and small organizations might face increasing number of attacks into their network or intellectual property. This may lead to data disclosure, data destruction, and damage of organization’s reputation. There are numerous threats in the cyber space which might be capable of stealing, destroying or making use of out sensitive data for financial and non-financial gains. As the amount of computer, mobile and internet users increases, so does the number of exploiters.
Cyberspace which is an upshot for the evolution of computer and digital communication technologies, has in recent decades become part and parcel of our daily lives. It has become an ideal source for cyber criminals to remain active while preying on victims. Higher the number of cyberspace users’, higher is the opportunities for exploitation. So it is the need of the hour to protect our computers, networks, digital applications and our data from unintended or unauthorized source, change or destruction.