Data Leakage Detection in Cloud Computing Environment

YEAR : 2022

Description

In the recent years internet technologies has become the backbone of any business organization. These organizations use this facility to improve their efficiency by transferring data from one location to another. But there are number of threats in transferring critical organizational data as any culprit employee may public this data. This problem is known as data leakage problem. In the proposed work, we are suggesting a model for data leakage problem. In this model, our aim is to identify the culprit who has leaked the critical organizational data. Data leakage detection in cloud computing is an essential research area due to the increasing usage of cloud computing services. As more and more data is being stored and processed on the cloud, it becomes crucial to detect any data leakage or unauthorized access to prevent data breaches.

ADDITIONAL INFORMATION

HARDWARE REQUIREMENTS

System : Intel i3 and above
Hard Disk : 40GB
RAM : Minimum 4GB
Processer : 64-bit, four-core, 2.5 GHz minimum per core

SOFTWARE REQUIREMENTS

Front End Language : HTML, CSS, JAVA, JSP SERVELTS
Backend : My SQL
Operating System : Windows 10 or 11
IDE : JAVA DEVELOPEMENT KIT

Reviews

There are no reviews yet.

Be the first to review “Data Leakage Detection in Cloud Computing Environment”

Your email address will not be published. Required fields are marked *

Product Enquiry