Review of methods for secret sharing in cloud computing
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 1
Abstract
Cloud computing provides various IT services. Many companies especially those who are in their initial stages found this cloud IT service economically beneficial. This IT service paradigm still requires overcoming some security concerns before it can be fully deployed. This paper focuses on the various secret sharing algorithms that can be used in conjunction with cloud computing IT paradigm such as Public Key Cryptography, Ravest- Shimer-Adleman (RSA) Algorithm, Diffie- Hellman Algorithm, and then Elliptic Curve Cryptography (ECC). In this Paper, the author’s show that using Public Key, Private Key and ECC how we can secretly share the data over the cloud environment. This paper also summarizes about which algorithm is best suited for cloud environment for secret sharing.
Authors and Affiliations
Dnyaneshwar Supe , Amit Srivastav , Dr. Rajesh S. Prasad
Doctor friendly software for HRV Analysis
This paper discusses about the development of HRV analysis software using VB and MATLAB easy to be used and understand by the doctors. The developed software provides user friendly GUI which provides the doctors...
A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage
Cloud computing is the emerging technology and also it requires strong security when dealing with public cloud data. Cloud access control is one of the security requirements. The basic security requirements for cloud sto...
ONLINE BUSINESS MANAGEMENT USING HYBRID CLOUD
Hybrid cloud combines the external public services and the internal private cloud providing services thereby enhancing the capabilities to secure, manage and govern the entire cloud spectrum. In this paper, online...
Calculation of Transient Overvoltages by using EMTP software in a 2-Phase 132KV GIS
VFTO of a 132 kV gas insulated substation have been calculation by using EMTP 2.4 version software. This paper is focused on simulation options of the transient connection GISoverhead line in simulation software. Howe...
Taxonomy of Cyber Crimes and Legislation in Saudi Arabia
Recent developments in the field of internet communication in the last decade worldwide have crossed all the physical boundaries laid down by human being and this era witnessed a major development in the field of I...