Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing

International Journal of Engineering Innovations and Management Strategies 1 (1):1-4 (2025)
  Copy   BIBTEX

Abstract

Cloud computing has revolutionized the storage and management of data by offering scalable, cost-effective, and flexible solutions. However, it also introduces significant security concerns, particularly related to data leakage, where sensitive information is exposed to unauthorized entities. Data leakage can result in substantial financial losses, reputational damage, and legal complications. This paper proposes a deep learning-based framework for detecting data leakage in cloud environments. By leveraging advanced neural network architectures, such as Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs), the model detects abnormal data access patterns that may indicate leakage. The system operates in real-time, continuously monitoring data interactions between users and the cloud. A large dataset containing normal and abnormal access logs is used to train and validate the model, ensuring it can effectively differentiate between legitimate and malicious activity. The performance of the model is evaluated using metrics such as accuracy, precision, recall, and F1-score, with the system achieving over 96% accuracy in identifying potential data leaks. Furthermore, the proposed solution is designed to be scalable and adaptable, making it suitable for dynamic cloud environments with evolving threats. Future enhancements to the system include integrating multi-cloud support and refining the model’s ability to detect sophisticated insider threats. This research highlights the importance of leveraging deep learning for real-time, proactive cloud security.

Other Versions

No versions found

Links

PhilArchive

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Deep Learning - Driven Data Leakage Detection for Secure Cloud Computing.Yoheswari S. - 2024 - International Journal of Engineering Innovations and Management Strategies 5 (1):1-4.
Integrating Ensemble _Deep Learning Models for Cybersecurity in Cloud Network Forensics (12th edition).B. Menaka Dr S. Arulselvarani, - 2024 - International Journal of Multidisciplinary and Scientific Emerging Research 12 (4):2653-2606. Translated by Dr. S. Arulselvarani.
OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
AI-Driven Deduplication for Scalable Data Management in Hybrid Cloud Infrastructure.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):587-597.
Virtual Machine for Big _Data in Cloud Computing (13th edition).Banupriya I. Manivannan B., - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (11):18380-18386. Translated by Manivannan B.
OPTIMIZING DATA SCIENCE WORKFLOWS IN CLOUD COMPUTING.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):71-76.
Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.

Analytics

Added to PP
2024-12-31

Downloads
112 (#200,285)

6 months
112 (#56,112)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

Empowering Cybersecurity with Intelligent Malware Detection Using Deep Learning Techniques.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-665.

Add more references