Abstract
An Improved Data Leakage Detection System is designed to mitigate the leakage of crucial and sensitive data in a cloud computing environment. Generally, leakage of data in computing system has caused a lot of irreparable damage or catastrophe to various institutions or organizations worldwide. Therefore, this research aims at detecting and preventing any intentional or non-intentional data leakages using dynamic password or key for data decryption security mechanisms. To achieve this the OOADM methodology was adopted. The new system was implemented using ASP.net MVC and Microsoft SQL Server Management Studio as the backend. And by incorporating an Audit trail/Transaction log mechanism, the new system monitors the activities within and outside the computing environment with date and time stamp. Hence, the system can be applied in any environment for the prevention and detection of any data leakage.
Highlights
Data leakage is the unauthorized transfer of classified information from a computer or datacenter to an unintended outsider
Data leakage can be intentional or accidental. It can be exposured of legally protected personal information, intellectual property or trade secrets
The methodology adopted for this research work is the Object-Oriented Analysis and Design methodology (OOAD)
Summary
Data leakage is the unauthorized transfer of classified information from a computer or datacenter to an unintended outsider. Data leakage can be intentional or accidental It can be exposured of legally protected personal information, intellectual property or trade secrets. Data leakage occurs always when confidential business information like customer or patient data, ASCII text file or design specifications, tariffs, property and trade secrets, and forecasts and budgets in spreadsheets are leaked out. When these are leaked out it leaves the company unprotected and goes outside the jurisdiction of the organization. This uncontrolled data leakage puts business in a vulnerable position. A distributed copy of data is found at some unauthorized location, the guilty agent can be detected very
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have