Please wait...

A Secure Model for Cloud Computing Based Data Storage and Retrieval - Final Year Project Report (CSC-404) 

Resource tools

File information File size Options

Original PDF File

147 KB Request

Screen

546 × 800 pixels (0.44 MP)

4.6 cm × 6.8 cm @ 300 PPI

82 KB Request
Resource details

Resource ID

88

Access

Open

Contributed by

Admin User

Author/Contributor

Anup Kumar Tamang, Asim Subedi, Vishnu Kumar Rana (Supervisor)

Publisher/Credit

Kathmandu: St. Xavier's College

Date

October 2014

Document type

Thesis or project

Department

Computer science

Course

BscCSIT, CSC-404: Project work

Level

Bachelor

Batch

2010

Abstract

Enterprises usually store data in internal storage and install firewalls to protect against
intruders to access the data. They also standardize data access procedures to prevent
raiders to disclose the information without permission. In cloud computing, the data
will be stored in storage provided by service providers.
Service providers must have a viable way to protect their clients’ data, especially to
prevent the data from disclosure by unauthorized insiders. Storing the data in
encrypted form is a common method of information privacy protection.
If a cloud system is responsible for both tasks on storage and encryption/decryption of
Data, the system administrators may simultaneously obtain encrypted data and
encryption keys.
This allows them to access information without authorization and thus poses a risk to
information privacy. This study proposes a business model for cloud computing based
on the concept of separating the encryption and decryption service from the storage
service
Furthermore, the party responsible for the data storage system must not store data in
Plain text, and the party responsible for data encryption and encryption must delete all
data upon the computation on encryption or decryption is complete.
A CRM (Customer Relationship Management) service is described in this project as
it. example to illustrate the proposed business model.

Search for similar resources

Remove