Simulation has been done in CloudSim3.0. Shares of file have been constructed in datacenter and these shares have been sent to hosts (servers) available in that datacenter. Ids of hosts (servers) and name of files which contain shares of file are sent to the user. Either, these ids and file names are sent to one client or set of employees working in the organization which is a client. It depends on the level of security, client organization desires. If client organization is large and control of data is to be distributed among a set of employees, then it is expected to distribute …show more content…
The file retrieved have the size 916 bytes.
4.3 RESULTS CONCLUDED FROM DIFFERENT ALGORITHMS According above results , In Shamir’s Algorithm the data recovered is not as per saved on the server, confidentiality is maintained. Using this algorithm the integrity is violated. , In Tree Based Recursive Information Hiding Scheme the data recovered is not as saved on the server, confidentiality and integrity is maintained. In the proposed algorithm, data recovered is same as saved on the server and Integrity and confidentiality is maintained.
It is important to maintain confidentiality, integrity and recovery of complete data.
4.4 CONCLUSION
The recreation of the proposed work exhibits that the it is most suitable for those Cloud organization suppliers who are responsible for storing the client's information and where crucial focus is to give secured data stockpiling organizations. They provide confidentiality, easy recovery of the data as all computer operators are not literate regarding the internal process going on to maintain the security. Such type of user only knows how to upload the