Secret Sharing Approach in Multi-database System
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 6
Abstract
Secret sharing schemes are ideal for storing highly sensitive data. A secret is divided into many parts and every participant gets his unique part. If we combine all of these parts and try regenerating the secret then it might be impractical, and therefore the threshold scheme is used. Shamir’s secret sharing scheme supports the same. Here, some of the parts or all of them are required to reconstruct the secret. Any threshold number of parts are sufficient to reconstruct the original secret. The Admin has a set of files which are confidentiality and availability of data. Whenever a Client requests to access the files, the Admin performs authentication of the user through an encrypted and stored on multiple databases so as to achieve Authentication module, who makes use if Shamir's secret sharing concept. This is similar to the One Time Password (OTP) mechanism. If the Client is authentic, Admin grants him the decryption key and the Client can access the file. In this paper, we shall discuss all this in detail using which we can provide security, replication of data and authentication.Â
Authors and Affiliations
Shipra PraveenKumar Choudhary, Apeksha Katarni, Shweta Manjrekar, Mrs. Vidyullata Devmane, Mrs. Vaishali Hirlekar
Cascading Guided Search Cloud Service Search Engine
Cloud computing is one contemporary technology in which the research community has recently embarked. This paradigm shifts the location of the infrastructure to the network to reduce the costs associated with the managem...
Fingerprint Image Enhancement Algorithms for Identification in an Electoral Process
Electoral process in many developing nations is characterized with fraud and failure as a result of inefficient and effective system of voter’s register and voting system. This usually leads to crises. This paper prese...
ANALYSIS OF SOM & SOFM TECHNIQUES USED IN SATELLITE IMAGERY
This paper describes the introduction of Supervised and Unsupervised Techniques with the comparison of SOFM (Self Organized Feature Map) used for Satellite Imagery. In this we have explained the way of spatial and tempor...
Enhancing the Performance of the BackPropagation for Deep Neural Network
The standard Backpropagation Neural Network (BPNN) Algorithm is widely used in solving many real problems in world. But the backpropagation suffers from different difficulties such as the slow convergence and convergence...
The Automated VSMs to Categorize Arabic Text Data Sets
Text Categorization is one of the most important tasks in information retrieval and data mining. This paper aims at investigating different variations of vector space models (VSMs) using KNN algorithm. we used 242 Arabic...