Nt1310 Unit 3 Data Regression Analysis

Decent Essays
e) Size of the message retrieved id 107 bytes. determined as follows:- Size (message) =number of characters in the message User is asked to send message of this size.
Simulation has been done in CloudSim3.0. Shares of file have been constructed in datacenter and these shares have been sent to hosts (servers) available in that datacenter. Ids of hosts (servers) and name of files which contain shares of file are sent to the user. Either, these ids and file names are sent to one client or set of employees working in the organization which is a client. It depends on the level of security, client organization desires. If client organization is large and control of data is to be distributed among a set of employees, then it is expected to distribute
…show more content…
The file retrieved have the size 916 bytes.

4.3 RESULTS CONCLUDED FROM DIFFERENT ALGORITHMS According above results , In Shamir’s Algorithm the data recovered is not as per saved on the server, confidentiality is maintained. Using this algorithm the integrity is violated. , In Tree Based Recursive Information Hiding Scheme the data recovered is not as saved on the server, confidentiality and integrity is maintained. In the proposed algorithm, data recovered is same as saved on the server and Integrity and confidentiality is maintained.
It is important to maintain confidentiality, integrity and recovery of complete data.

4.4 CONCLUSION
The recreation of the proposed work exhibits that the it is most suitable for those Cloud organization suppliers who are responsible for storing the client's information and where crucial focus is to give secured data stockpiling organizations. They provide confidentiality, easy recovery of the data as all computer operators are not literate regarding the internal process going on to maintain the security. Such type of user only knows how to upload the

Related Documents

  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Pt2520 Unit 1 Assignment

    • 382 Words
    • 2 Pages

    Capacity cloud sends ask for alongside the client ID to the encryption or unscrambling administration framework. In the wake of sending the information to the client, the encryption or unscrambling cloud framework is not having the power to put away the decoded information and any decoded information. It ought to be erased after the information send had been send to the client the explanation for this is as decoding key is being put away in a similar cloud. All together tp lessened the hazard figure an unscrambled information ought to be erased be erased to protected security can protection. 5.2 Fitting access to information for information stockpiling framework…

    • 382 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 5 Algorithm

    • 689 Words
    • 3 Pages

    In this way file is reconstructed back from its shares. The size of each piece is |F| / (n-k), where |F| is size of secret/data, which is smaller than size of each piece produced through algorithm explained in [52]. In this scheme, m-1 shares of file F may provide some information about F. So in this scheme it is advisable to encrypt F before dispersing it and decode it after reconstruction of the encrypted version.…

    • 689 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The following data is received from a real-time measuring device and is stored at memory location Data1. You are required to write an assembly language program segment with the corresponding data definition directives that would extract the data items and store them at memory locations Day, Month, Year, Temperature and Pressure. [10 points] 5 bits 4 bits 7 bits 8 bits 8 bits Day Month Year Temperature Pressure Write an assembly language program for the following HLL code: [10 Points] unsigned int crc32(const char* data, size_t length) { const unsigned int POLY = 0xEDB88320; unsigned int reminder = 0xFFFFFFFF; for(size_t i = 0; i < length; i++){ reminder ^= (unsigned char)data[i]; // must be zero extended for(size_t bit = 0; bit…

    • 144 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    The third application software is mapping. Mapping application, are those that display street maps or satellite, and are usually used to locate places and directions. The most extensive mapping application is Google maps. When it comes to the location based software it uses your current location, and shows you the closest restaurants, shops, banks, etc. these software's are available for desktops, laptops, and handheld computers.…

    • 223 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Every business owner should consider the below points before setting up a network and also businesses might get expanded or changed in future. Long term investments should be considered here for future growth as well. So we should have a proper planning before we establish. Number of Users – Number of network users, printers, scanners, servers, data centers and security measures. Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases, and of Bacterial Methods of Warfare (Geneva Protocol) was penned and signed on 17 June, 1925. This was a treaty signed by the Allies at the close of World War I, which was actually just an extension and re-verification of the Treaty of Versailles (signed in 1919) prior to WWI. The Geneva Protocol furthered the Treaty of Versailles in that it expanded the weapons ban to include a ban on bacteriological warfare. In 1969, this protocol was further expanded to include CS gas agents and harassing agents (probably due to their use by the U.S. during the Vietnam War).…

    • 656 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Allowing kids under the age of fourteen to play tackle football can have severe consequences to their young minds. I personally do not like football but I’m sure there are other ways that younger kids can play football without tackling each other and getting hurt. “ Goldstein and his colleagues advocate for no tackle football before 14 because children’s bodies, particularly their necks and upper bodies, aren’t strong enough to counteract the bobbling of the head and shaking of the brain that occurs during tackles” (Kounang 1). Not only does that sound painful but why would a parent want that for their child.…

    • 280 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    One of the promises the government promised to Americans is that the affordable care act would reduce health care costs. Has the affordable act care kept its promises? According to Laural Lorenzetti, drug prices and rising medical costs are still ongoing issues in America in the 21st century. To show the ongoing problems to her viewers, Lorenzetti, Fortune.com the writer uses the artwork that is created by Zerbo-Getty. The computer generated photography median is that the rising health care costs are still is a big problem in today’s society.…

    • 777 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    CRM is a management approach that provide better ways to manage a companies preferred customers, and provide the customers with the products and information they need. However, making sure the company secures all that sensitive data is very important. Cloud computing means that data storing and accessing is done through the internet instead of your computer's hard drive. Salesforce is a cloud based system, which means that the data is accessible from anywhere on the internet, therefore, there need to be some careful measures to ensure that the customer’s data cannot be compromised.…

    • 111 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Digital Forensics Essay

    • 544 Words
    • 3 Pages

    This phenomenal technology cloud computing has expeditiously evolved in the field of Information Technology. Cloud Service Providers (CPS) have brought diverse transformation changes in cloud computing. This technology has formed new opportunities /haven for criminal activities. The paper has used a descriptive literature review to determine issues that are at present affecting digital investigations. There are several issues that influence the preservation, acquisition and data acquisition of evidence in the cloud environment.…

    • 544 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Abstract: This paper to create Health Care Information’s (HCIs) that are efficient and secure. HCIs can be stored in a third party cloud. The patients, who have created their profiles in the system, make their own HCIs, mentioning their disease, symptoms and other sufficient details. The doctors who are also a part of the system attend to the queries of the patients that have been updated in the cloud. The doctors’ prescription is updated by the admin of the system, whereas the cloud admin has no access to the data.…

    • 1250 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Abstract— In recent years, many industries and companies have turned their attention in realizing how going ‘green’ can benefit public relations, reducing cost and lowering the global emissions for industrial manufacturing. Thus Green Computing has become an innovative way on how technology and ecology converge together. Nowadays, people prefer Network-based computing to an in-house based computing. The concept of cloud computing has dramatically changed the classical method of computation. Cloud computing and Green computing are two most emergent areas in Information Communication Technology (ICT) with immense applications in the entire globe.…

    • 971 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Abstract: The Content Distribution Sites (CDS) are the destinations which shares the information among the site 's clients. The information is essential angle in exceptionally association so the information 's sharing ought to be done in an extremely effective way. In this paper we propose a framework which addresses a substance sharing site that gives a safe sharing of information among the gatherings. The information can be any kind of information like the content based or sight and sound based.…

    • 1628 Words
    • 7 Pages
    Improved Essays