CALL FOR PAPERS : April 2020

Submission Last Date
Submit Manuscript Online





Open Access

Creative Commons License

Data Leakage Detection and Dependable Storage Service In Cloud Computing


Suyog Chadawar , Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India; Chandu Vaidya, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India; Simran Saide, Rajiv Gandhi College of Engineering & Research, Nagpur, Maharashtra, India


Data integrity, dependable distributed storage, error localization, data dynamics, Cloud Computing, Cryptography, 3 Data Encryption Standard (3 DES), Secure Hashing Algorithm (SHA 1), Message Digest Algorithm 5 (MD5)


The field of cloud computing enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing user’s physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. A data distributor has given sensitive data to a set of supposedly trusted agents. Sometimes data is leaked and found in unauthorized place e.g., on the web or on somebody's laptop. The owner of the data is called as distributors and the trusted third parties are called as agents. Sometimes the data loss also occurs. Data leakage happens every day when confidential business information such as customer or patient data, company secrets, budget information etc. are leaked out. When this information is leaked out, then the companies are at serious risk. Most probably data are being leaked from agent’s side. So, company has to very careful while distributing such a data to agents. The method of Data leakage detection and Dependable storage service in Cloud computing is simple yet powerful enough to fit the needs of organizations and clients.

Other Details:

Manuscript Id :IJSTEV2I10223
Published in :Volume : 2, Issue : 10
Publication Date: 01/05/2016
Page(s): 694-701
Download Article




Submit Article

Dear Authors, You can submit your article to our journal at the following link: http://www.ijste.org/Submit

Impact Factor

The Impact Factor of our Journal is 4.753 (Year - 2016)
3.905 (Year - 2015) 2.895(Year -2014)

Click Here

Submit Payment Online

Dear Authors, Now you can submit the payment receipt to our journal online at the following link: index.php?p=Payment


Computer Science Directory. We are listed under Computer Research Institutes category

Share on Social media

Home | Privacy Policy | Terms & Conditions | Refund Policy | Feedback | Contact Us
Copyright © 2014 ijste.org All rights reserved