Privacy Preservation using Shamir’s Secrete Sharing Algorithm for Data Storage Security

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 2

Abstract

The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security. Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.

Authors and Affiliations

Tejashree Paigude , Prof. T. A. Chavan

Keywords

Related Articles

An Efficient Boundary Detection and Image Segmentation Method Based on Perceptual Organization

In this paper, we presents a novel method for detecting the boundaries of the object in outdoor images by using most common properties of the images such as perceptual organization laws. Here the proposed segmentation sc...

Image Search Reranking

The existing methods for image search re ranking suffer from the unfaithfulness of the as sumptions under which the text-based images search result. The resulting images contain more irrelevant images. Hence the re ranki...

Efficient User Authentication and Providing Host Security against Malware

To improve the trustworthiness of a host and system data cryptographic verification technique is used. From these approach users keystroke to identify the legitimate user’s to get the service from the server by using int...

MCA Learning Algorithm for Incident Signals Estimation:A Review

Recently there has been many works on adaptive subspace filtering in the signal processing literature. Most of them are concerned with tracking the signal subspace spanned by the eigenvectors corresponding to the eigenva...

Adaptive Integration of P2P and Mobile-Ad-hoc-Networks by a Cross Modeled CHORD Protocol

We set DHT (Distributed Hash Table) centered P2P (Peer to Peer) program-Chord in to MANET (Mobile Ad-hoc Network) in this paper. Then, we propose a new routing modified scheme Cross Modeled Chord(CM-Chord) which bases on...

Download PDF file
  • EP ID EP157671
  • DOI -
  • Views 85
  • Downloads 0

How To Cite

Tejashree Paigude, Prof. T. A. Chavan (2014). Privacy Preservation using Shamir’s Secrete Sharing Algorithm for Data Storage Security. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 8(2), 96-101. https://www.europub.co.uk/articles/-A-157671