Enforcement an Evidence and Quality of Query Services in the Cost-Effective Cloud
2021
Cloud outburst is dangerous as information gets leaked, thereby allowing sensitive data to a bunch of trusted agents to an unauthorized place of location. Security practitioners are always interested in data cloud leakage issues that arise from various sources, like e-mail correspondence and different network channels. In this paper emphasis is laid on how to assess the probability that the leaked information came from one or more agents. Thus, the proposed system can identify those parties who are guilty of such cloud leakage even if the information is altered. Data allocations are used by the system for this purpose which can induce data records that are realistic but not fake and to improve the identification of cloud leakage through e-mails. Filtering of these e-mails is done by blocking e-mails that contain pictures, videos or sensitive data in a corporation. Classification of e-mail is primarily done on the basis of fingerprints of message bodies. The white and black listing of mail addresses is the principle used in e-mail filtering and therefore converting the words specified to spam.
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
14
References
0
Citations
NaN
KQI