Abstract

With advances in the field of cloud computing many computing rsources and/or services are being provided to the end user on a pay -as-you-use basis. Data outsourcing is a new paradigm in which a third party provides storage services. This is more cost e ffective for the user as there is no need of purchasing expensive hardware and software for data storage. The user is also relieved from administrative activities of software upgrades and maintenance.Before data out sourcing can become viable, the data pr ovider needs to guarantee that the datais secure, be able to execute queries on the data, and the results of the queries must also be secure and not visible to the data provider. Data encryption, Homomorphic Encryption, Secret Sharing algorithms and Private Information R etrieval (PIR) are the techniques widely used for secure data outsourcing. CIA (Confidentiality, Integrity and Availability) are the challenging issues associated with data storage management with/without data outsourcing. In this paper the performance of two secret sharing algo rithms are compared. The Shamir’s secret sharing algorithm and Rabin’s Information Dispersal Algorithm (IDA) are implemented in a private cloud setup using the OpenStack Cloud framework.

Highlights

  • Cloud Computing can be defined as the shifting of computing resources like processing power, network and storage resources from desktops and local servers to large data centres hosted by companies like Amazon, Google, Microsoft etc

  • The cloud services that were provided earlier can be classified into three categories: Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS)

  • Homomorphic Encryption, Secret Sharing algorithms and Private Information Retrieval (PIR) are the techniques widely used for secure data outsourcing

Read more

Summary

INTRODUCTION

Cloud Computing can be defined as the shifting of computing resources like processing power, network and storage resources from desktops and local servers to large data centres hosted by companies like Amazon, Google, Microsoft etc. These resources are provided to a user or company on highly scalable, elastic and pay-as-you-use basis. Most cloud computing vendors give users little control over where data is stored. Under such circumstances it becomes paramount for a user or company to ensure the confidentiality of his data before it is moved off premise

AVAILABILITY OF DATA
RELATED WORK
SYSTEM MODEL AND FRAMEWORK
SHAMIR’S SECRET SHARING
RABIN’S INFORMATION DISPERSAL ALGORITHM
EXPERIMENTAL SETUP
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call