Secret Sharing Approach in Multi-database System

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 6

Abstract

Secret sharing schemes are ideal for storing highly sensitive data. A secret is divided into many parts and every participant gets his unique part. If we combine all of these parts and try regenerating the secret then it might be impractical, and therefore the threshold scheme is used. Shamir’s secret sharing scheme supports the same. Here, some of the parts or all of them are required to reconstruct the secret. Any threshold number of parts are sufficient to reconstruct the original secret. The Admin has a set of files which are confidentiality and availability of data. Whenever a Client requests to access the files, the Admin performs authentication of the user through an encrypted and stored on multiple databases so as to achieve Authentication module, who makes use if Shamir's secret sharing concept. This is similar to the One Time Password (OTP) mechanism. If the Client is authentic, Admin grants him the decryption key and the Client can access the file. In this paper, we shall discuss all this in detail using which we can provide security, replication of data and authentication. 

Authors and Affiliations

Shipra PraveenKumar Choudhary, Apeksha Katarni, Shweta Manjrekar, Mrs. Vidyullata Devmane, Mrs. Vaishali Hirlekar

Keywords

Related Articles

To Control Electrical MCBs using Hand Gesture Recognition

There has been growing interest in development of new techniques and methods for Human-Computer Interaction (HCI). Gesture Recognition is one of the important areas of this technology. Gesture Recognition means interfaci...

AN APPROACH TO GENERATE MST WITHOUT CHECKING CYCLE

Abstract: A minimum spanning tree of an undirected graph can be easily obtained using classical algorithms by Prim or Kruskal. MST generation is a NP hard problem. Now this paper represents an algorithm to find minimum s...

COORDINATED DISTRIBUTED SCHEDULING IN WIRELESS MESH NETWORK

IEEE 802.16 based wireless mesh networks (WMNs) are a promising broadband access solution to support flexibility, cost effectiveness and fast deployment of the fourth generation infrastructure based wireless networks. Re...

Binary Quantum Communication using Squeezed Light: Theoretical and Experimental Frame Work

The aim of this paper is to develop framework to generate squeezed light for binary quantum communication. Both theoretical and experimental models to generate squeezed state  using optical parametric amplifier (OPO), w...

Alternative Vidhi to Conversion of Cyclic CNF->GNF

In automata theory Greibach Normal Form shows that A->aV n*, where ‘a’ is terminal symbol and Vn is nonterminal symbol where * shows zero or more rates of Vn [1]. Most popular questions, conversion of following c...

Download PDF file
  • EP ID EP650819
  • DOI 10.24297/ijct.v15i6.1606
  • Views 96
  • Downloads 0

How To Cite

Shipra PraveenKumar Choudhary, Apeksha Katarni, Shweta Manjrekar, Mrs. Vidyullata Devmane, Mrs. Vaishali Hirlekar (2016). Secret Sharing Approach in Multi-database System. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 15(6), 6819-6823. https://europub.co.uk/articles/-A-650819