Review of methods for secret sharing in cloud computing

Abstract

Cloud computing provides various IT services. Many companies especially those who are in their initial stages found this cloud IT service economically beneficial. This IT service paradigm still requires overcoming some security concerns before it can be fully deployed. This paper focuses on the various secret sharing algorithms that can be used in conjunction with cloud computing IT paradigm such as Public Key Cryptography, Ravest- Shimer-Adleman (RSA) Algorithm, Diffie- Hellman Algorithm, and then Elliptic Curve Cryptography (ECC). In this Paper, the author’s show that using Public Key, Private Key and ECC how we can secretly share the data over the cloud environment. This paper also summarizes about which algorithm is best suited for cloud environment for secret sharing.

Authors and Affiliations

Dnyaneshwar Supe , Amit Srivastav , Dr. Rajesh S. Prasad

Keywords

Related Articles

“SPOOFING”……. Headache to IT world. 

The whole world is engaged to provide the complete security to information when it is in network. But the techniques somewhere fail to overcome on attacks. One of them is Spoofing. Spoofing is an active security...

A modified Clustering algorithm based on Optimization method. 

This study presents an effective optimization technique such as Ant Colony Optimization (ACO), Particle Swarm Optimization (PCO) and Fuzzy C-Means (FCM) for clustering the dataset. This technique is tested on sever...

A Survey on Windows Component Loading Vulnerabilities

Dynamic loading is a mechanism by which a computer program can, at run time, load a library memory, retrieve the addresses of functions and variables contained in library, execute those functions, and unload the library...

A Novel Low power and Area efficient Carry Look Ahead Adder Using GDI Technique  

A full adder is one of the essential component in digital circuit design, many improvements have been made to reduce the architecture of a full adder. The proposed method aims on Gate diffusion input (GDI) whic...

Criminals and crime hotspot detection using data mining algorithms: clustering and classification  

Criminal activities have been increased tremendously. So security has become a major issue to the people. The control actions should be taken by the police department. The police department has to take corrective...

Download PDF file
  • EP ID EP87788
  • DOI -
  • Views 98
  • Downloads 0

How To Cite

Dnyaneshwar Supe, Amit Srivastav, Dr. Rajesh S. Prasad (2013). Review of methods for secret sharing in cloud computing. International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(1), 11-17. https://europub.co.uk/articles/-A-87788