Data Security and Privacy Protection for Cloud Storage Using BCH

##plugins.themes.bootstrap3.article.main##

MEESALA MANIKANTA

Abstract

In recent technology cloud storage technology which is gaining more and more attention.. The protection of the secrecy of the arts relies for the most part on the fact that encryption technology while storing or processing the customer data. Our cloud-based, three-layer storage framework. The proposed framework can use cloud storage and protect secret information. The hash-Solomon coding algorithm is created for distinct portions, and it using data to divide it. The first part received the knowledge, if the knowledge is lacking, and it have lost. In the real world from the human point of view of which are the algorithms secure the data and use the knowledge and assurance of a bucket, and in accordance with what has been designed by the effective cause cannot be in the reason Furthermore, SaaS, According to the computational intelligence algorithm that can compute distribution clouds, fog, and machine, respectively, SaaS , the customer rejected their request in the accessible hosting environment via the network from various clients via application users. The customer was unable or unwilling to submit them to the controlling cloud infrastructure, especially in cloud settings like, with the exception of limited user-specific application configuration. For SaaS models, Google Apps and Microsoft Office 365 are good options.

##plugins.themes.bootstrap3.article.details##

Section
Articles