Data Leakage Detection in Cloud Computing Environment
Authors- S.Dhanish, Dr.P.Kavitha
Abstract--Internet technology have emerged as the foundation of any company organization in recent years. By moving data between locations, many firms utilize this capability to increase their efficiency. Transferring important corporate data, however, carries a lot of risks because any negligent employee could make the information public. Data leakage is the term for this issue. We are proposing a model for the data leaking problem in this paper. Our goal in this approach is to find the person responsible for the leak of important organizational data. Because more and more people are using cloud computing services, data leak detection is a crucial area of study. Finding any data leaks or unauthorized access is essential to preventing data breaches as more and more data is processed and stored on the cloud. This research paper’s goal is to suggest a method for\ detecting data leaks in cloud computing settings. To identify data leakage, the suggested system employs a hybrid strategy that blends static and dynamic analy is methods. While dynamic analysis is done during runtime to find any real data leaks, static analysis is done on the source code to find possible data leakage sites.