Privacy Preservation using Shamir’s Secrete Sharing Algorithm for Data Storage Security
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 2
Abstract
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security. Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.
Authors and Affiliations
Tejashree Paigude , Prof. T. A. Chavan
An Energy-efficient Clock Synchronization Protocol for Wireless Sensor Network
The behavior of Wireless detector (sensor) networks (WDN) is today wide analyzed. One in all the foremost necessary problems is said to their energy consumption, as this contains a major impact on the network time period...
Improving the Efficiency of Call Admission Control in Wireless Cellular Communication Networks by Frequency Sharing Techniques
In this paper, a two-tier cellular communication wireless network is characterized by overlapping the service area for managing the new calls users having different mobility speed. The overlapping property of the two-tie...
Privacy Preservation using Shamir’s Secrete Sharing Algorithm for Data Storage Security
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud d...
A Study of Local Binary Pattern Method for Facial Expression Detection
Face detection is a basic task for expression recognition. The reliability of face detection & face recognition approach has a major role on the performance and usability of the entire system. There are several ways...
A Smart Intelligent Way of Video Authentication Using Classification and Decomposition of Watermarking Methods
Video Watermarking serves as a new technology mainly used to provide security to the illegal distribution of digital video over the web. The purpose of any video watermarking scheme is to embed extra information into vid...