scholarly journals Cloud Computing Security in Multi-Clouds using Shamir’s Secret Sharing Scheme

2016 ◽  
Vol 155 (13) ◽  
pp. 1-2
Author(s):  
Naveena R. ◽  
Nikhita Salian

Cloud Computing, apparent technology has both advantages and disadvantages. In spite of multitudinous benefits Cloud is offering, broad acceptance of Cloud has taken a toll on the basic security in cloud environments. It becomes more pronounced when thinking of multi cloud environments. This paper focuses on literature work associated with different variants of RSA in fusion with other methods and a proposed methodology which integrates dual techniques Improved RSA (based on principle of Hamming weight) and SSS (Secret Sharing Scheme) methods to improvise the security of data in cloud environments. The proposed method was compared with existing method taking in one parameter and was been proved that it excels the performance drastically.


2019 ◽  
Vol 130 ◽  
pp. 91-97 ◽  
Author(s):  
Jing Li ◽  
Xianmin Wang ◽  
Zhengan Huang ◽  
Licheng Wang ◽  
Yang Xiang

2020 ◽  
Vol 17 (6) ◽  
pp. 2669-2673
Author(s):  
Minakshi Kamboj ◽  
Sanjeev Rana

Flexibility, acceptance of hire of Cloud Computing, control facilities originates a number of challenges. In precise, safety has been widely conveyed to create the key issues which stop movement to the cloud. Shamir’s Secret Sharing Scheme splits the secret message into n shares with threshold k and distribution of shares to n participants and each participant has unique share of secret message. For reconstructing the secret message, minimum k fragments are required. Threshold scheme which requires only k shares to re-construct the secret message is implemented, as collection of shares from all the n participants to reconstruct the secret message may be unfeasible. AES encryption turns out to be totally inappropriate if a password is used as an alternative of providing the key. The attacker finds file, downloads Ax crypt, and brute force/dictionary attacks it until it’s cracked. An additional security can provided to user password which of varying length by splitting the password into n shares. Advance Encryption Standard (AES) procedure is implemented to encipher the produced shares. AES with 256-bit key is applied to encode the share for every member. Covering arrangement alternative to Boolean masking established on Shamir’s Secret Sharing arrangement is suggested.


Sign in / Sign up

Export Citation Format

Share Document