Detection of Data Leakage Using Cloud Computing

Authors

  • S. Fazloon  Assistant. Professor, Mother Theresa Institute of Computer Applications, Palamaner, S. V. University, Andhra Pradesh, India
  • Mrs P. Poornima  Mother Theresa Institute of Computer Applications, Palamaner, S. V. University, Andhra Pradesh, India

Keywords:

Data Leakage, Cloud Computing, Healthcare, Detection.

Abstract

Enterprise resource planning has helped the life sciences and the healthcare industries of today produce enormous amounts of data. Since managing such a large volume of data is challenging and internal employee intimidation around data leakage is on the rise, businesses are implementing security measures like Data Loss Prevention and Digital Rights Management to stop data leakage. Cloud Service Provider will include the doctors in this project and mail their credentials. Patients can ask doctors to upload reports on their behalf. Doctors are able to view patient requests and respond to them. Here, the patient can upload his or her files, and the cloud service provider may ask that specific user (the patient) to upload any missing files if necessary. On the other hand, the mechanism for preventing data leaking likewise becomes complex and difficult. In order to handle large amounts of data with increasing efficiency and a set of rules that give workers the outcomes they need, cloud computing approaches are deployed. It lessens the need for employees to actively choose components to address issues with supervised, unsupervised, and semi-supervised healthcare data.

References

  1. Chen Xiaolin, Feng Junwen. A Study on Information Security Management of Agricultural Supply Chain. Science of Science and Management of Science and Technology. 2007(11)  :38-42.
  2. Chi T H, Zhou X. Web GIS Resolution for China’s Sustainable Development. Resources Science [J] 2001, 23 (1): 34-39.
  3. Fearne A, Hughes D.Success factors in the fresh produce supply chain [J].British Food Journal, 2000, 102(10):760-772.
  4. Han Y,Geng H.VINCA-A visual and personalized business-level composition language for chaining web-based services[C].Proceedings of the 1st International Conference on Service-Oriented Computing.Springer-Verlag,2003:165-177.
  5. Hau L. Lee, Seungjin Whang. Information sharing in a supply chain [J]. International Journal of Technology Management, 2000, 20, (3):373-387.
  6. Lambert D M, Cooper M C.Issues in supply chain management [J].Industrial Marketing Management. 2000, (29):65-83
  7. Li Yan-xia, Zhao Qing-zhei. The Design of Management Information System of Agricultural Products. Computer Technology and Application. [J].2005(4):93-95.
  8. [Qi Yuan. Research on Information Sharing in Supply Chain [D]. Shang Hai University. 2002, P49-50.
  9. Song ke, Shi Shenghui. The Implementation of Information System Based on Browser/Server Structure. North China Electric Power [J].2001(3):12-14.

Downloads

Published

2022-12-30

Issue

Section

Research Articles

How to Cite

[1]
S. Fazloon, Mrs P. Poornima, " Detection of Data Leakage Using Cloud Computing" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 6, pp.76-81, November-December-2022.