Review of methods for secret sharing in cloud computing
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 1
Abstract
Cloud computing provides various IT services. Many companies especially those who are in their initial stages found this cloud IT service economically beneficial. This IT service paradigm still requires overcoming some security concerns before it can be fully deployed. This paper focuses on the various secret sharing algorithms that can be used in conjunction with cloud computing IT paradigm such as Public Key Cryptography, Ravest- Shimer-Adleman (RSA) Algorithm, Diffie- Hellman Algorithm, and then Elliptic Curve Cryptography (ECC). In this Paper, the author’s show that using Public Key, Private Key and ECC how we can secretly share the data over the cloud environment. This paper also summarizes about which algorithm is best suited for cloud environment for secret sharing.
Authors and Affiliations
Dnyaneshwar Supe , Amit Srivastav , Dr. Rajesh S. Prasad
Detection of Colluding Collision and Identity Delegation Attacks in Wireless Ad Hoc Networks via SADEC
The colluding collision and identity delegation attack comes under the new class of attacks of wireless ad hoc networks namely stealthy attacks that diminish the expense and sight of the invader. The nodes which are...
Harvesting collective Images for Bi-Concept exploration
Noised positive as well as instructive pessimistic research examples commencing the communal web, to become skilled at bi-concept detectors beginning these examples, and to apply them in a search steam engine for retriev...
NEED OF FUTURE WEB TECHNOLOGY THE SEMANTIC WEB A BRIEF SURVEY
The World Wide Web (WWW) is a huge collection of information this allows the people to share information from the repositories of databases which are available globally. From day to day the information which is a...
ICCC: Information Correctness to the Customers in Cloud Data Storage
Cloud storage is the only solution to the IT organizations to optimize the escalating storage costs and maintenance. Data outsourcing in to the cloud has become today trending environment for the thin organizations. The...
Design of Dynamic Error Handling Tool
t— In any programming language or environment, error messages perform role of intermediate between system (program development tool) and programmer. So it is important point of interaction in system. This point bec...