Two pages. An enterprising group of entrepreneurs is starting a new data storage and retrieval business, StoreItRite, Inc. The new company will accept digitalized data (both text and images), and...

1 answer below »


Two pages.


An enterprising group of entrepreneurs is starting a new data storage and retrieval business,
StoreItRite, Inc.The new company will accept digitalized data (both text and images), and store it on hard drives until needed by the customer. Customer data will be transmitted to and from
StoreItRite
over the Internet.
StoreItRiteguarantees data confidentiality and integrity.



StoreItRitewill also provide data security for their internal operations. Company employees will need to exchange confidential email, and will need a mechanism for verifying the integrity and originator of some email messages. Also,
StoreItRiteintends a daily backup of all customer data to a remote facility via a leased line. They wish to do so as economically as possible, while ensuring the data’s confidentiality and integrity.



You are
StoreItRite'sconsultant on this project.
Describe how you would satisfy
StoreItRite’s requirements as stated above.



Part 3Write a one page paper on
Homomorphic Encryption



Part 4: Write a one page paper on
Quantum Cryptography.



Please type in times roman 12 font



at least 2 biblography for each




Document Preview:

Two pages. An enterprising group of entrepreneurs is starting a new data storage and retrieval business, StoreItRite, Inc. The new company will accept digitalized data (both text and images), and store it on hard drives until needed by the customer. Customer data will be transmitted to and from StoreItRite over the Internet. StoreItRite guarantees data confidentiality and integrity. StoreItRite will also provide data security for their internal operations. Company employees will need to exchange confidential email, and will need a mechanism for verifying the integrity and originator of some email messages. Also, StoreItRite intends a daily backup of all customer data to a remote facility via a leased line. They wish to do so as economically as possible, while ensuring the data’s confidentiality and integrity. You are StoreItRite's consultant on this project. Describe how you would satisfy StoreItRite’s requirements as stated above. Write a one page paper on Homomorphic Encryption. Write a one page paper on Quantum Cryptography. Font Size 12 for all at least 2 biblography for each



Answered Same DayDec 20, 2021

Answer To: Two pages. An enterprising group of entrepreneurs is starting a new data storage and retrieval...

David answered on Dec 20 2021
128 Votes
Major Requirements of the company StoreItRite:
1. Accept the digitalized data from the customer over the internet. The company ensures
the Transmitted data Confidentiality and Integrity. (SSL)
2. Data Security for internal purposes. (encryption)
3. Email exchange and mech
anism of verifying them based on origin. (Position based
Quantum Cryptography)
4. Backup of the data on remote facility via leased line being economical along with
maintaining the data Confidentiality and Integrity. (SSL along with VPN)
For the First requirement of the company the secure connection is required to be built
between the customer and the StoreItRite servers. The scenario is Client Server based
architecture hence secure connection needed to be there in communication. For this purpose
of the StoreItRite the secured connection on HTTPS (Hypertext Transfer Protocol Secure)
needed to be used by the company website and the connection with each customer is secured
by 128-bit secured socket layer certificate (SSL) which will ensure the data communicated
between the two parties is encrypted and no hacker can eavesdrop on the data being
communicated. (SSL Certificates, 2012)
For the data security in the internal storage of the company the data should be encrypted and
then stored at the storage of the company with the combination of the customer and company
combination of keys. The data should be secure by using 256-bit security encryption, the
encryption depends upon the data being accessed and retrieved AES and MD5 are the most
popular choices and are the strong encryption algorithms and hashing algorithms for storing
of data on the HDD. (HDD and MD5) (McCullough, 2008)
Email exchange will be there among the employees of the StoreItRite hence secure email
server needed to be build which will have no connection with the storage of the data, hence
server will be different. The employees can communicate via email and the communication
will be secured internally. For the verification of the email origination the technique of IP
address validation can be used but this can be easily spoofed hence stronger cryptography is
required like Position Based Quantum Cryptography which will allow the receiver to confirm
that the data is from the intended source rather than any other. Another scheme is use of
digital certificates along with the email which will also ensure the same thing but with lesser
overhead and very good performance. (HDD and MD5)
For the final requirement of the company the company need the combination of the two
technologies, first as discussed to have SSL connection with the remote server and use VPN
on the leased line to double secure the communication between the two servers. As the
backup is very...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here