Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing

International Journal of Engineering Innovations and Management Strategies 1 (1):1-4 (2025)
  Copy   BIBTEX

Abstract

Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs), the model detects abnormal data access patterns that may indicate leakage. The system operates in real-time, continuously monitoring data interactions between users and the cloud. A large dataset containing normal and abnormal access logs is used to train and validate the model, ensuring it can effectively differentiate between legitimate and malicious activity. The performance of the model is evaluated using metrics such as accuracy, precision, recall, and F1-score, with the system achieving over 96% accuracy in identifying potential data leaks. Furthermore, the proposed solution is designed to be scalable and adaptable, making it suitable for dynamic cloud environments with evolving threats. Future enhancements to the system include integrating multi-cloud support and refining the model’s ability to detect sophisticated insider threats. This research highlights the importance of leveraging deep learning for real-time, proactive cloud security.

Other Versions

No versions found

Links

PhilArchive

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2024 - International Journal of Engineering Innovations and Management Strategies 5 (1):1-4.
OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
AI-Driven Deduplication for Scalable Data Management in Hybrid Cloud Infrastructure.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
Machine Learning-Enhanced Secure Cloud Storage with Attribute-Based Data Access.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):418-429.
Secure and Efficient Data Deduplication Framework for Hybrid Cloud Architectures.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):623-633.
Innovative Deduplication Strategies for Cost-Effective Data Management in Hybrid Cloud Models.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
OPTIMIZING DATA SCIENCE WORKFLOWS IN CLOUD COMPUTING.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):71-76.
Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.

Analytics

Added to PP
2024-12-31

Downloads
50 (#433,838)

6 months
50 (#101,401)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references