Development of a Frame Work for Secure Data Storage using Information Dispersal with Quality of Security

Abstract

Cloud Storage is a service where data is remotely maintained, managed, and backed up. Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. The service allows the users to store files online, so that they can access them from any location via the Internet. An invention of cloud computing technology comes with numerous benefits for IT industries and others. The data store in the cloud can be easily shared among stakeholders irrespective of their location, i.e., data availability is high. As the data are accessible through network, so major concern is to maintain the data confidentiality. Data breach in any form organization losses their trustworthy, and this affect the reputation of the organization. The varied issues of security associated with confidentiality, privacy, data security, authentication and integrity must be taken care. This is very important to maintain the privacy and security of data all the time. newlineCloud services allow individuals and businesses to use software and hardware resources that are managed by cloud providers at remote locations and achieves great benefits economically, as this reduces the overall expenditure cost, operational cost and improves flexibility in the system. Storage of the information is done in Dynamo DB of AWS cloud (public). All the operations are performed on the data, so protection and privacy must be preserved in all means with high level vigilance. The required outputs can be retrieved on user s machine when the case stands as the data on the cloud(public) is not stored in plaintext. newlineThis study deals with the use of homomorphic encryption to encrypt the client s data in cloud server and also it enables to execute required computations on this encrypted data. Proposed a new hybrid algorithm by combining the two alg

Description

Keywords

Citation

item.page.endorsement

item.page.review

item.page.supplemented

item.page.referenced