Cloud Computing Security in Multi-clouds using Shamir's Secret Sharing Scheme

被引:0
|
作者
Pundkar, Sumedh N. [1 ]
Shekokar, Narendra [2 ]
机构
[1] SNDT Womens Univ, UMIT, Bombay, Maharashtra, India
[2] DJ Sanghvi Coll Engn, Bombay, Maharashtra, India
关键词
Data Security; Cloud; Secret sharing; Information Dispersal;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In order to leverage a remote cloud based infrastructure, a company essentially gives away private data and information that might be sensitive and confidential to the service provider. Data Integrity and Confidentiality can be protected by using secret sharing schemes. To prevent service availability failure, multi-cloud data storage system can be implemented. In this paper, multimedia is protected using the Shamir's Secret Sharing in Multi-cloud Databases.
引用
收藏
页码:392 / 395
页数:4
相关论文
共 50 条
  • [1] CloudStash: Using Secret-Sharing Scheme to Secure Data, Not Keys, in Multi-Clouds
    Alsolami, Fahad
    Boult, Terrance
    2014 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (ITNG), 2014, : 315 - 320
  • [2] Medical image security and EPR hiding using Shamir's secret sharing scheme
    Ulutas, Mustafa
    Ulutas, Guzin
    Nabiyev, Vasif V.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (03) : 341 - 353
  • [3] Security limitations of Shamir's secret sharing
    Lemnouar, Noui
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (04): : 977 - 989
  • [4] A survey on data security issues in cloud computing: From single to multi-clouds
    Alzain, Mohammed A.
    Soh, Ben
    Pardede, Eric
    Journal of Software, 2013, 8 (05) : 1068 - 1078
  • [5] An Entropy-based Demonstration of the Security of Shamir's Secret Sharing Scheme
    Corniaux, Christian L. F.
    Ghodosi, Hossein
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 45 - 47
  • [6] A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing
    Pang, LJ
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 840 - 848
  • [7] Several generalizations of Shamir's secret sharing scheme
    Lai, CP
    Ding, CS
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2004, 15 (02) : 445 - 458
  • [8] Protecting AES with Shamir's Secret Sharing Scheme
    Goubin, Louis
    Martinelli, Ange
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 79 - 94
  • [9] Sound Steganography using Shamir Secret Sharing Scheme
    Kacamak, Salajdin
    Uka, Arban
    2017 6TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2017, : 217 - 220
  • [10] Cloud Computing Availability: Multi-clouds for Big Data Service
    Lee, Sangdo
    Park, Hyoungyill
    Shin, Yongtae
    CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, 2012, 310 : 799 - 806