Review of methods for secret sharing in cloud computing
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 1
Abstract
Cloud computing provides various IT services. Many companies especially those who are in their initial stages found this cloud IT service economically beneficial. This IT service paradigm still requires overcoming some security concerns before it can be fully deployed. This paper focuses on the various secret sharing algorithms that can be used in conjunction with cloud computing IT paradigm such as Public Key Cryptography, Ravest- Shimer-Adleman (RSA) Algorithm, Diffie- Hellman Algorithm, and then Elliptic Curve Cryptography (ECC). In this Paper, the author’s show that using Public Key, Private Key and ECC how we can secretly share the data over the cloud environment. This paper also summarizes about which algorithm is best suited for cloud environment for secret sharing.
Authors and Affiliations
Dnyaneshwar Supe , Amit Srivastav , Dr. Rajesh S. Prasad
A New Approach for Dynamic Load Balancing Algorithm
Mission-critical applications must run 24x7, and networks need to be able to scale performance to handle large numbers of client requests without unwanted delays. A "server cluster" is a group of independent server...
A Survey on Security in Palmprint Recognition: A Biometric Trait
Biometric based authentication and recognition, the science of using physical or behavioral characteristic for identity verification is becoming a security principal in many areas. Their utilization as an authentic...
Pre Layout And Post Layout Analysis Of Parallel Counter Architecture Based On State Look-Ahead Logic
The main objective of this project presents designing a parallel counter architecture which is used to improve the operating frequency. It is a partitioning methodology which consists of two paths named as counting...
Selfishness of Discriminate Node in Caching Based Wireless Sensor Network
The size of wireless sensor node is small and the battery power of these sensor nodes is also limited. The wireless sensor nodes consume battery power in transmitting, processing the data. Generally, Wireless sen...
A Comprehensive Study of Data Mining and Application
Data mining refers to extracting or ―mining‖ knowledge from large amounts of data. Data mining involves an integration of techniques from multiple disciplines such as database technology, statistics, machine learni...