Review of methods for secret sharing in cloud computing
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 1
Abstract
Cloud computing provides various IT services. Many companies especially those who are in their initial stages found this cloud IT service economically beneficial. This IT service paradigm still requires overcoming some security concerns before it can be fully deployed. This paper focuses on the various secret sharing algorithms that can be used in conjunction with cloud computing IT paradigm such as Public Key Cryptography, Ravest- Shimer-Adleman (RSA) Algorithm, Diffie- Hellman Algorithm, and then Elliptic Curve Cryptography (ECC). In this Paper, the author’s show that using Public Key, Private Key and ECC how we can secretly share the data over the cloud environment. This paper also summarizes about which algorithm is best suited for cloud environment for secret sharing.
Authors and Affiliations
Dnyaneshwar Supe , Amit Srivastav , Dr. Rajesh S. Prasad
A Survey on Fault Tolerance in Work flow Management and Scheduling
Fault Tolerance is a configuration that prevent a computer or network device from failing in the event of unexpected problem or error such as hardware failure, link failure, unauthorized access, variations in the...
Enhancing Key Management In Intrusion Detection System For Manets
Manets are the ad hoc networks that are build on demand or instantly when some mobile nodes come in the mobility range of each other and decide to cooperate for data transfer and communication. Therefore there is n...
Detection Model for Daniel-of-Service Attacks using Random Forest and k-Nearest Neighbors
Because of the increasing of networks’ speed and the amount of network traffic, it is essential that IDSs need to be lightweight to cope with it before classification. Feature selection has been successfully used t...
Mitigating Denial of Service Attacks in Wireless Networks
The open nature of the wireless media becomes a root cause for denial of service attack. Denial of Service (DOS) can be different types and disrupt multiple layers. The idea here is to prevent the cyberspace from DOS att...
A Framework for Email Clustering and Automatic Answering Method (Formal Approach)
T- The mail-box consisting of number of emails in which many attributes or files are existing in a single email and hence they can be considered as a database. It is not easy to find out the important email or me...