Abstract
Abstract
In a Multi cloud system, we can store a large amount of privet data and sensitive information without any proper optimization of the user information. We will be focused on reducing data leakages to every cloud storage provider and provide a better technique for distributed user privet information over different CSPs in a leakage aware manner. The process of an unplanned distribution of data chunks will result in disposing of the essential information while using multiple clouds. To reduce data leakage, the hybrid optimization algorithm is proposed in this research work. The proposed model is implemented in cloud sim and results is analysed in terms of certain parameters.
Publisher
Research Square Platform LLC
Reference19 articles.
1. Kul G, "Toward Pinpointing Data Leakage from Advanced Persistent Threats," 2021 7th IEEE Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and, Security (2021) (IDS), NY, USA, pp. 157–162
2. Lakshmi K, Hareesh K, Obaidat MS (2017) "Data leakage detection and prevention in cloud computing using hybrid RSA algorithm," International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), Chennai, India, 2017, pp. 180–185. doi: 10.1109/ICSTM.2017.8056223
3. Bendre MT, Tijare PA, Wankhade RG (2017) "Data leakage detection and prevention in cloud computing using cryptography techniques," International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India, 2017, pp. 1–4. doi: 10.1109/ICCUBEA.2017.8441955
4. Mishra AK, Singh A, Tiwari A (2018) "Data leakage prevention in cloud computing using a hybrid approach," 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Bengaluru, India, 2018, pp. 1–6. doi: 10.1109/ICCCNT.2018.8494065
5. Yadav RK, Ahuja NL, Yadav DS (2019) "Prevention of data leakage in cloud computing using fuzzy vault and chaotic map," IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, India, 2019, pp. 1–6. doi: 10.1109/ICECCT.2019.8869046