Privacy Preservation using Shamir’s Secrete Sharing Algorithm for Data Storage Security
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 2
Abstract
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security. Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.
Authors and Affiliations
Tejashree Paigude , Prof. T. A. Chavan
Facial Image Noise Removal Via a Trained Dictionary
In this project we address that, sparsity has shown to be useful in source separation. In most cases, the sources are not sparse currently and needs to sparsify them using a known dictionary. The problem here is that, if...
Information Security and Risk Management for Banking System
Risk management provides an effective approach for measuring the security, but existing risk management approaches come with major shortcomings such as the demand for a very detailed knowledge about the IT security spher...
Weakly Supervised Critical Nugget Finding Algorithm for Improving Classification Accuracy
Accuracy is more important in data classification. An elimination of noisy data, attribute and property discovery is a major consideration in the proposed research. From the overall given population the system predicts t...
Performance Estimation of 2*3 MIMO-MC-CDMA in Rayleigh Fading Channel
In this paper we analyze the performance of 2*3 MIMO-MC-CDMA system in MATLAB which greatly reduces BER by increasing the efficiency of system. MIMO and MC-CDMA system arrangement is used to decrease bit error rate and a...
Security Strategies for Online Social Networks
In this decade online social networks (OSNs) have marvelous enlargement per hundred of millions of users on the internet. The internet users are more good-looking about OSNs for information sharing and social interaction...