Filters








35,463 Hits in 2.4 sec

Secret sharing for cloud data security: a survey

Varunya Attasena, Jérôme Darmont, Nouria Harbi
2017 The VLDB journal  
The aim of this paper is thus to wholly survey secret sharing schemes with respect to data security, data access and costs in the pay-as-you-go paradigm.  ...  ., data encryption, anonymization, replication and verification, help enforce different facets of data security. Secret sharing is a particularly interesting cryptographic technique.  ...  However, data security remains one of the top concerns for cloud users and would-be users.  ... 
doi:10.1007/s00778-017-0470-9 fatcat:awegze5lkba55hvzxxhd3al5sa

A Novel Multi-Secret Sharing Approach for Secure Data Warehousing and On-Line Analysis Processing in the Cloud [chapter]

Varunya Attasena, Nouria Harbi, Jérôme Darmont
2019 Cloud Security  
In this paper, the authors propose a new multi-secret sharing approach for deploying data warehouses in the cloud and allowing on-line analysis processing, while enforcing data privacy, integrity and availability  ...  However, storing and transferring sensitive data into the cloud raises legitimate security concerns.  ...  Second, although we provide in this paper a raw framework for OLAPing shared data, more research is required to implement all operations needed in OLAP analyses, as well as incremental updates.  ... 
doi:10.4018/978-1-5225-8176-5.ch025 fatcat:ktjqhcjpxnh2vlkej3p5vdb7xe

A Comparative Study of the Secret Sharing Algorithms for Secure Data in the Cloud

S Jaya Nirmala
2012 International Journal on Cloud Computing Services and Architecture  
Data encryption, Homomorphic Encryption, Secret Sharing algorithms and Private Information Retrieval (PIR) are the techniques widely used for secure data outsourcing.  ...  The Shamir's secret sharing algorithm and Rabin's Information Dispersal Algorithm (IDA) are implemented in a private cloud setup using the OpenStack Cloud framework.  ...  Secret Sharing techniques are also one of the widely used techniques for data outsourcing.  ... 
doi:10.5121/ijccsa.2012.2406 fatcat:gh2zzvnnlzczrkhklhemor4qby

A Novel Multi-Secret Sharing Approach for Secure Data Warehousing and On-Line Analysis Processing in the Cloud

Varunya Attasena, Nouria Harbi, Jérôme Darmont
2015 International Journal of Data Warehousing and Mining  
In this paper, we propose a new multi-secret sharing approach for deploying data warehouses in the cloud and allowing on-line analysis processing, while enforcing data privacy, integrity and availability  ...  However, storing and transferring sensitive data into the cloud raises legitimate security concerns.  ...  Second, although we provide in this paper a raw framework for OLAPing shared data, more research is required to implement all operations needed in OLAP analyses, as well as incremental updates.  ... 
doi:10.4018/ijdwm.2015040102 fatcat:yu7x73mtwfc53ewuse46wrsrqa

RS-MONA: Reliable and Scalable Secure Method to Store and Share Secrete Data for groups in Cloud

Sunita R.Patil, Sandeep Kadam
2014 International Journal of Computer Applications  
In this paper system proposes a secure multi-owner data sharing scheme, for dynamic group in the cloud.  ...  By providing group signature and encryption techniques, any cloud user can securely share data with others.  ...  as well as secure method for data sharing for groups.  ... 
doi:10.5120/17794-8595 fatcat:walzvoihxbafjj6uxebiexazpy

A Secure Data Transmission Scheme Based on Secret Sharing for the Maritime Cloud Environment
해사클라우드 환경에 적합한 비밀분산 기반의 안전한 데이터 전송 기법

Donghyeok Lee, Namje Park
2017 KIISE Transactions on Computing Practices  
In this paper, we propose a method for secure data transmission through The Maritime Cloud domain.  ...  The proposed technique, based on the "secret sharing" scheme, is delivered through specifically-dedicated geocasting software. Thus, only authorized vessels can restore the original information.  ...  정보과학회 컴퓨팅의 실제 논문지 제23권 제4호(2017. 4) 해사클라우드 환경에 적합한 비밀분산 기반의 안전한 데이터 전송 기법 (A Secure Data Transmission Scheme Based on Secret Sharing for the Maritime Cloud Environment) 이 동 혁 † 박 남 제 †  ... 
doi:10.5626/ktcp.2017.23.4.232 fatcat:m6pk7pjzqnbd5blcvlel57m4cm

A Generator Based Polynomial with Secret Encryption Scheme for Secure Data Sharing and Privacy in Multi-Party/Federated-Cloud Computation

V. Keerthi, T. Anuradha
2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
This multi-party mechanism can be applied to federated cloud for computation securely.  ...  In this paper Polynomial Based Encryption Secret Sharing Scheme (PBESSS) for Multi-Party mechanism is proposed that allows multiple parties to exchange secret data between them at the same time secret  ...  In case of Federated clouds upon exchange of secret data between the Agriculture institutions a secure and effective privacy preserving scheme will be modeled and developed where data is securely shared  ... 
doi:10.35940/ijitee.b8270.1210220 fatcat:tzbm7i3yubafjnakdepxu3aryy

IJSRST173150 | Improved Shamir's Secret Based Key Aggregate Mechanism for Secure Data Sharing in Multi Cloud Storage

Vilas Swapnali, R Arote, Paikrao
unpublished
The Data sharing is an important functionality in cloud storage.  ...  Multi-cloud environment has ability to reduce the security risks as well as it can ensure the security and reliability.  ...  Sharing of decryption keys in secure way plays important role. Public-key cryptosystems provides delegation of secret keys for different ciphertext classes in cloud storage.  ... 
fatcat:em2onjq3v5bwpa6mwimnmjwf6y

An Exhaustive Review on Security Issues in Cloud Computing

2019 KSII Transactions on Internet and Information Systems  
However, security, privacy and integrity of data is a major concern.  ...  In this paper we have discussed security challenges in cloud computing and also list recommended methods available for addressing them in the literature.  ...  The secret sharing scheme is used in [7] to overcome the security issues in multi clouds. Secret sharing scheme is used to secure the data in multi clouds.  ... 
doi:10.3837/tiis.2019.06.025 fatcat:d2lidmgohvashh6vbqchkvekti

A Secret data sharing Model for Agriculture Experts in Federated Cloud based on Polynomial based Encrypted Scheme

V. Keerthi, T. Anuradha
2021 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Federation of cloud will allow resource and data sharing, but the security threats severely limit the application development as the usage of data processing or sharing mechanisms will leak private information  ...  So in this research paper, a Polynomial Based Encryption Secret Sharing Scheme (PBESSS)is proposed as Federated cloud data exchange system with multiple cloud instances of the same cloud host or separate  ...  PROPOSED FEDERATED CLOUD DATA SHARING FOR AGRI-EXPERTS In this paper Polynomial Based Encryption Secret Sharing Scheme (PBESSS) is proposed as a Federated Enterprise data sharing system for different cloud  ... 
doi:10.35940/ijitee.d8542.0210421 fatcat:h4niojf7unalbeop5vrcyv32mi

Securing Multi-cloud Using Secret Sharing Algorithm

M. Muhil, U. Hemanth Krishna, R. Kishore Kumar, E.A. Mary Anita
2015 Procedia Computer Science  
Data encryption, homomorphic encryption, secret sharing algorithms is the techniques extensively used for securing data outsourcing.  ...  This paper applies Shamir's secret sharing scheme to secure data outsourcing in Multi-cloud.  ...  SHAMIR'S SECRET SHARING ALGORITHM Data can be compromised or lost in the cloud. Hence securing the data is a vital process in the cloud environment.  ... 
doi:10.1016/j.procs.2015.04.011 fatcat:eyk65zykcvamlgavk7do3duvdm

Electronic Medical Reports Security in Cloud Storage Environment based on Visual Cryptography

Aparna Lanjekar, Apurva K., Yaminee Koli, Jayashree Katti
2017 International Journal of Computer Applications  
This article addresses these issues by proposing Visual Cryptography Scheme (VCS) and multi secret sharing for securing the multiple EMR.  ...  But data security is a major issue that prevents users from storing files on the cloud. Every day enormous amount of data is generated in multi-specialist hospitals.  ...  An Innovative Solution for Cloud Security through Quantitative Analysis of Various Visual Cryptography Schemes [1]. a) Visual cryptography scheme with sharing of one secret image.  ... 
doi:10.5120/ijca2017915969 fatcat:xtzkudalvrdlxi6vywcfmzn42q

Cloud Computing Security in Multi-Clouds using Shamir's Secret Sharing Scheme

Naveena R., Nikhita Salian
2016 International Journal of Computer Applications  
Data Integrity and Confidentiality can be protected by using secret sharing schemes. To prevent service availability failure, multi-cloud data storage system can be implemented.  ...  In this paper, multimedia is protected using the Shamir's Secret Sharing in Multi-cloud Databases.  ...  The secret sharing schemes are a perfect fit in the multi cloud environment to provide data security in cloud without the drawbacks of encrypting data and service availability failure due to single cloud  ... 
doi:10.5120/ijca2016912051 fatcat:vlp5lpynxzapzah2h546723kpa

Secure Data Outsourcing on Cloud Using Secret Sharing Scheme

Arup Kumar Chattopadhyay, Amitava Nag, Koushik Majumder
2017 International Journal of Network Security  
The encrypted data files will be shared on the cloud. A threshold (t, n)-secret sharing scheme applied on the symmetric key of the encryption algorithm.  ...  The n share-keys will be generated from the secret key and will be distributed among participants. If t or more (≤ n) shared-keys are submitted, the original data files can be retrieved.  ...  Authors in [3, 31, 33] proposed secret sharing for securing multi-cloud i.e. a collection of several cloud infrastructures. Another fast and secure data outsourcing scheme is proposed by Liu at el.  ... 
dblp:journals/ijnsec/ChattopadhyayNM17 fatcat:i57i7o3wczatxnomu2k64odonu

Persistent Data Security in Public Clouds

Sara Ibn, Hassan Badir, Abderrahmane Sbihi
2016 International Journal of Computer Applications  
The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers.  ...  In fact, a number of secret sharing algorithms have been suggested to deal with these security issues.  ...  Therefore, for data stored for long period of time the security given by conventional secret sharing scheme might be insufficient.  ... 
doi:10.5120/ijca2016912430 fatcat:zthvkgqn7re3dadmqe7eb72lze
« Previous Showing results 1 — 15 out of 35,463 results