Review of methods for secret sharing in cloud computing

Abstract

Cloud computing provides various IT services. Many companies especially those who are in their initial stages found this cloud IT service economically beneficial. This IT service paradigm still requires overcoming some security concerns before it can be fully deployed. This paper focuses on the various secret sharing algorithms that can be used in conjunction with cloud computing IT paradigm such as Public Key Cryptography, Ravest- Shimer-Adleman (RSA) Algorithm, Diffie- Hellman Algorithm, and then Elliptic Curve Cryptography (ECC). In this Paper, the author’s show that using Public Key, Private Key and ECC how we can secretly share the data over the cloud environment. This paper also summarizes about which algorithm is best suited for cloud environment for secret sharing.

Authors and Affiliations

Dnyaneshwar Supe , Amit Srivastav , Dr. Rajesh S. Prasad

Keywords

Related Articles

A New Approach for Dynamic Load Balancing Algorithm  

Mission-critical applications must run 24x7, and networks need to be able to scale performance to handle large numbers of client requests without unwanted delays. A "server cluster" is a group of independent server...

A Survey on Security in Palmprint Recognition: A Biometric Trait  

Biometric based authentication and recognition, the science of using physical or behavioral characteristic for identity verification is becoming a security principal in many areas. Their utilization as an authentic...

Pre Layout And Post Layout Analysis Of Parallel Counter Architecture Based On State Look-Ahead Logic 

The main objective of this project presents designing a parallel counter architecture which is used to improve the operating frequency. It is a partitioning methodology which consists of two paths named as counting...

Selfishness of Discriminate Node in Caching Based Wireless Sensor Network 

The size of wireless sensor node is small and the battery power of these sensor nodes is also limited. The wireless sensor nodes consume battery power in transmitting, processing the data. Generally, Wireless sen...

A Comprehensive Study of Data Mining and Application 

Data mining refers to extracting or ―mining‖ knowledge from large amounts of data. Data mining involves an integration of techniques from multiple disciplines such as database technology, statistics, machine learni...

Download PDF file
  • EP ID EP87788
  • DOI -
  • Views 139
  • Downloads 0

How To Cite

Dnyaneshwar Supe, Amit Srivastav, Dr. Rajesh S. Prasad (2013). Review of methods for secret sharing in cloud computing. International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(1), 11-17. https://europub.co.uk/articles/-A-87788