Privacy Preservation using Shamir’s Secrete Sharing Algorithm for Data Storage Security

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 2

Abstract

The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security. Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.

Authors and Affiliations

Tejashree Paigude , Prof. T. A. Chavan

Keywords

Related Articles

Big Data : Overview

Big data is data that exceeds the processing capacity of traditional databases. The data is too big to be processed by a single machine. New and innovative methods are required to process and store such large volumes of...

Data Flow for Effective Data Leakage Prevention using Elliptic Curve Digital Signature Algorithm

Sensitive data is leaked in software firm, government sectors and also from the web. To prevent this leakage, data allocation strategies are used. Data allocation Strategy improves the probability of identifying leakages...

Maximizing Communication Quality with Bandwidth Guarantees in Wireless Mesh Networks

Wireless Mesh Network (WMN) helps remote areas to gain access to Internet. There might be number of paths to gain access to Internet. Finding a path with maximum bandwidth is the problem to be addressed. Many solutions t...

Data Acquisition and Reduction Algorithm for Shearing Interferometer Based Long Trace Profilometer

The Long Trace Profilometer (LTP) is a non-contact optical profiling instrument, designed to measure the absolute surface figure to nanometer accuracy of long strip flat, spherical and aspherical X-ray optics of up to 12...

A Puzzle Based Authentication Scheme for Cloud Computing

This article presents puzzle based authentication scheme in which cloud user registers and solves the puzzle, puzzle solving time and sequence of image block is stored and validated by local server and the cloud user get...

Download PDF file
  • EP ID EP157671
  • DOI -
  • Views 73
  • Downloads 0

How To Cite

Tejashree Paigude, Prof. T. A. Chavan (2014). Privacy Preservation using Shamir’s Secrete Sharing Algorithm for Data Storage Security. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 8(2), 96-101. https://europub.co.uk/articles/-A-157671