Building an Authentication and Quality of Query Services in the Cloud

J. Sunitha, Mrs. A.M. Sermakani
2015 Procedia Computer Science  
Cloud outpouring is careful when an information distributor has given sensitive data to a set of trusted agents and few o f the information is leaked and found in an unauthorized place. An enterprise data leak may be a scary proposition. Security practitioners always deal with data cloud leakage issues that arise from various ways like e-mail and different net channels. In case of information cloud leakage from trusted agents, the distributor should assess the probability that the leaked
more » ... tion came from one or more agents. The proposed system can identify those parties who are guilty for such cloud leakage even once the data is altered. For this the system will use data allocation ways are also can inject "realistic but fake" information records improve the identification of cloud leakage. Moreover, data can also be leaked from inside an organization through e-mail. Hence there's also a need to filter these e-mails, may be done by blocking e-mails that contain pictures, videos or sensitive data in an organization. A principle utilized in e-mail filtering is classify e-mail based mostly the fingerprints of message bodies, the white and black lists of mail addresses and the words specified to spam.
doi:10.1016/j.procs.2015.04.073 fatcat:4kduznav5zbabaw5jpfw7cjv5m