Research Article

Cloud Computing Security in Multi-Clouds using Shamir’s Secret Sharing Scheme

by  Naveena R. Kannan, Nikhita Salian
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 155 - Issue 13
Published: Dec 2016
Authors: Naveena R. Kannan, Nikhita Salian
10.5120/ijca2016912051
PDF

Naveena R. Kannan, Nikhita Salian . Cloud Computing Security in Multi-Clouds using Shamir’s Secret Sharing Scheme. International Journal of Computer Applications. 155, 13 (Dec 2016), 1-2. DOI=10.5120/ijca2016912051

                        @article{ 10.5120/ijca2016912051,
                        author  = { Naveena R. Kannan,Nikhita Salian },
                        title   = { Cloud Computing Security in Multi-Clouds using Shamir’s Secret Sharing Scheme },
                        journal = { International Journal of Computer Applications },
                        year    = { 2016 },
                        volume  = { 155 },
                        number  = { 13 },
                        pages   = { 1-2 },
                        doi     = { 10.5120/ijca2016912051 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2016
                        %A Naveena R. Kannan
                        %A Nikhita Salian
                        %T Cloud Computing Security in Multi-Clouds using Shamir’s Secret Sharing Scheme%T 
                        %J International Journal of Computer Applications
                        %V 155
                        %N 13
                        %P 1-2
                        %R 10.5120/ijca2016912051
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

In order to leverage a remote cloud based infrastructure, a company essentially gives away private data and information that might be sensitive and confidential to the service provider. Data Integrity and Confidentiality can be protected by using secret sharing schemes. To prevent service availability failure, multi-cloud data storage system can be implemented. In this paper, multimedia is protected using the Shamir’s Secret Sharing in Multi-cloud Databases.

References
  • I. MOROZAN, "Multi-clouds database: A new model to provide security in cloud computing," CNS, 2014.
  • M. Li, "On the confidentiality of information dispersal algorithms and their erasure," in ArXiv, 2013.
  • S.-J. L. a. W.-H. Chung, "An Efficient (n,k) Information Dispersal Algorithm Based on Fermat Number," IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, vol. 8, no. August, 2013.
  • S. S. B. ,. A. A. P. S.Jaya Nirmala, "A COMPARATIVE STUDY OF THE SECRET SHARING ALGORITHMS FOR SECURE DATA IN THE CLOUD," International Journal on Cloud Computing: Services and Architecture(IJCCSA), vol. 2, no. August, 2012.
  • E. E. a. A. B. Hamza, "SECRET SHARING OF 3D MODELS USING BLAKELY SCHEME," in 25th Biennial Symposium on Communications.
  • Y. C. H. J. L. T. Y. K.-C. L. Su Chen, "A Secure Distributed File System Based on Revised Blakley’s Secret Sharing Scheme," in IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012.
  • B. S. a. E. P. Mohammed A. AlZain, "A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds," JOURNAL OF SOFTWARE, vol. 8, no. MAY, 2013.
  • S. B. K. M. K. Alam, "An approach to secret sharing algorithm in cloud computing security over single to multi clouds," International Journal of Scientific and, 2013.
  • V. A. S. I. Daniel Pasail˘a, "Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes".
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Data Security Cloud Secret sharing Information Dispersal

Powered by PhDFocusTM