Check Google Rankings for keyword:

"secret sharing cloud storage"

drjack.world

Google Keyword Rankings for : secret sharing cloud storage

1 Secure Cloud-of-Clouds Storage with Space-Efficient Secret ...
https://www.gsd.inesc-id.pt/~mpc/pubs/StorageSecretSharing.pdf
Secret sharing allows distributing files among the clouds providing information-theoretic secu- rity/secrecy.
→ Check Latest Keyword Rankings ←
2 Making secret sharing based cloud storage usable
https://www.emerald.com/insight/content/doi/10.1108/ICS-01-2019-0016/full/html
The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing ...
→ Check Latest Keyword Rankings ←
3 Secure cloud-of-clouds storage with space-efficient secret ...
https://eprint.iacr.org/2021/666
Secret sharing allows distributing files among the clouds providing information-theoretic security/secrecy. However, existing secret sharing schemes are ...
→ Check Latest Keyword Rankings ←
4 (PDF) Making secret sharing based cloud storage usable
https://www.researchgate.net/publication/336386886_Making_secret_sharing_based_cloud_storage_usable
... A secret sharing scheme splits a secret into some shares and distributes the shares to multiple shareholders such that the secret can be ...
→ Check Latest Keyword Rankings ←
5 Making secret sharing based cloud storage usable - DiVA Portal
http://www.diva-portal.org/smash/record.jsf?pid=diva2:1359466
Selecting the optimal secret sharing parameters, cloud storage servers and othersettings for securely storing the secret data shares, ...
→ Check Latest Keyword Rankings ←
6 An Efficient Proactive Secret Sharing Scheme for Cloud Storage
https://link.springer.com/chapter/10.1007/978-3-030-81645-2_20
The scheme divides the secret of large amount of data into multi-secrets, and uses secret sharing to make multi-secrets meet the security of the ...
→ Check Latest Keyword Rankings ←
7 Secret Sharing for Cloud Data Security - Archive ouverte HAL
https://hal.archives-ouvertes.fr/hal-01529610/file/secret-sharing-cloud-survey.pdf
Multi secret sharing schemes (MSSSs) thus aim to reduce computation, storage and data transfer costs by sharing and reconstructing more than one ...
→ Check Latest Keyword Rankings ←
8 SSeCloud: Using secret sharing scheme to secure keys
https://iopscience.iop.org/article/10.1088/1755-1315/81/1/012207
The system encrypts uploading files on the client side and splits encrypted keys into three shares. Each of them is respectively stored by users, cloud storage ...
→ Check Latest Keyword Rankings ←
9 A Novel Multi-Secret Sharing Approach for Secure Data ...
https://arxiv.org/pdf/1701.05449
Data warehouses, OLAP, Cloud computing, Secret sharing, Data privacy, ... Critical security concerns in (especially public) cloud storage are depicted in ...
→ Check Latest Keyword Rankings ←
10 An Efficient Proactive Secret Sharing Scheme for Cloud Storage
https://www.springerprofessional.de/en/an-efficient-proactive-secret-sharing-scheme-for-cloud-storage/19380254
The scheme periodically updates and verifies the shadow shares held by cloud service providers. In this way, an adversary can recover the secret if and only if ...
→ Check Latest Keyword Rankings ←
11 Distributed Storage Meets Secret Sharing on the Blockchain
http://ieeexplore.ieee.org/document/8503089/
We use a novel combination of distributed storage, private key encryption, and Shamirs secret sharing scheme to distribute transaction data, ...
→ Check Latest Keyword Rankings ←
12 a secret sharing group key management techniques to ...
https://www.jetir.org/papers/JETIR2003320.pdf
Abstract : A cloud-based big data sharing system utilizes a storage facility from a cloud service provider to share data with legitimate.
→ Check Latest Keyword Rankings ←
13 Secret Sharing Scheme: Securing data in multi-clouds ... - IJISET
https://ijiset.com/vol2/v2s3/IJISET_V2_I3_132.pdf
Keywords:Cloud storage security; secret-sharing; multi- clouds; performance; key management,cloudstash;. 1. Introduction. Cloud storage has many attractive ...
→ Check Latest Keyword Rankings ←
14 Selecting Secret Sharing Instantiations for Distributed Storage
https://dl.acm.org/doi/10.1145/3327962.3331458
Distributed storage systems using secret sharing enable information-theoretic confidentiality, making them especially suitable for the ...
→ Check Latest Keyword Rankings ←
15 Making secret sharing based cloud storage usable - SlideShare
https://www.slideshare.net/joeywchou/making-secret-sharing-based-cloud-storage-usable
Making secret sharing based cloud storage usable · 2. 1. · 3. replication. · 4. Section 2 provides background information about secret sharing schemes for ...
→ Check Latest Keyword Rankings ←
16 PBFT and Secret-Sharing in Storage Settings | PRISMACLOUD
https://prismacloud.eu/wp-content/uploads/2017/01/PBFT-and-Secret-Sharing-in-Storage-Settings.pdf
secret sharing malicious clients. Byzantine fault-tolerance. 1 Introduction. Cloud data storage often is a scalable and cost-efficient alternative to in- ...
→ Check Latest Keyword Rankings ←
17 Archistar/archistar-smc: Secret sharing library in Java ... - GitHub
https://github.com/Archistar/archistar-smc
Secret sharing library in Java for the Archistar multi-cloud storage system - GitHub - Archistar/archistar-smc: Secret sharing library in Java for the ...
→ Check Latest Keyword Rankings ←
18 Secret sharing - Wikipedia
https://en.wikipedia.org/wiki/Secret_sharing
Secret sharing (also called secret splitting) refers to methods for distributing a secret among a group, in such a way that no individual holds any ...
→ Check Latest Keyword Rankings ←
19 An Efficient Secret Sharing-based Storage System for Cloud ...
https://www.ije.ir/article_92492.html
In this paper, we propose a new method for storing aggregate data in IoTs by the use of -threshold secret sharing scheme in the cloud storage.
→ Check Latest Keyword Rankings ←
20 An Approach Secret Sharing Algorithm in Cloud Computing ...
https://www.semanticscholar.org/paper/An-Approach-Secret-Sharing-Algorithm-in-Cloud-over-Alam-SharmilaBanu/394898ffd4f5c12c5f3891490abb49d045140350
33 Citations · An Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Cloud · Cloud Computing Security from Single to Multi-clouds ...
→ Check Latest Keyword Rankings ←
21 A Big Data Storage Scheme Based on Distributed Storage ...
https://my.ece.msstate.edu/faculty/skhan/pub/A_K_2019_BDS.pdf
Cloud locations. The Shamir's Secret Sharing and Secure Hash. Algorithm are employed to provide the security and authenticity of this work.
→ Check Latest Keyword Rankings ←
22 Protect your data in the cloud with frX secret sharing ...
https://fragmentix.com/
Protect your data in the cloud with fragmentiX secret sharing storage appliances With Secret Sharing - one of the few demonstrably unbreakable methods for ...
→ Check Latest Keyword Rankings ←
23 An Efficient mechanism to address the Security and Privacy ...
http://www.joics.org/gallery/ics-2677.pdf
To address the security problem of sharing data on the cloud storage, a secret sharing group key management protocol is proposed in the paper and.
→ Check Latest Keyword Rankings ←
24 Secure Data Outsourcing on Cloud Using Secret Sharing ...
http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p912-921.pdf
Data Outsourcing in Cloud (DOC) has its exclusive ben- efits like low-cost, lower management overhead, elasticity of storage etc and these encourage ...
→ Check Latest Keyword Rankings ←
25 A Fast and Resource Efficient FPGA Implementation of Secret ...
https://past.date-conference.com/proceedings-archive/2018/pdf/0670.pdf
addressed. One approach to overcome these challenges is by applying secret sharing in a distributed storage setting, known as cloud of clouds approach.
→ Check Latest Keyword Rankings ←
26 Secure and Distributed IoT Data Storage in Clouds Based on ...
https://www.computer.org/csdl/journal/nt/5555/01/09947313/1IiL9X7RB5e
First, an ultra-lightweight secret sharing algorithm is designed to map original messages generated by IoT devices to a set of shorter message shares. Second, ...
→ Check Latest Keyword Rankings ←
27 Secret Sharing and Reliable Cloud Computing
http://csrc.nist.gov/groups/ST/CETA_2011/abstracts/DESMEDT_Secret-Sharing.pdf
Secret Sharing and Reliable Cloud Computing. Yvo Desmedt ... We argue that the decision to move to cloud storage does not take relia bility into account.
→ Check Latest Keyword Rankings ←
28 An Approach Secret Sharing Algorithm in Cloud Computing ...
https://www.ijsrp.org/research-paper-0413/ijsrp-p16122.pdf
to reconstruct the original secret [7]. Index Terms- Shamir's Secret Sharing Algorithm, data integrity, cloud storage, data intrusion, service availability. I.
→ Check Latest Keyword Rankings ←
29 CLOUD COMPUTING SECURITY USING SHAMIR'S SECRET ...
http://ijates.com/images/short_pdf/376.pdf
Keywords: Data Security, Cloud, Secret sharing, Information Dispersal ... most of the research has focused on providing secure “cloud storage” such as in ...
→ Check Latest Keyword Rankings ←
30 Cross-group Secret Sharing for Secure Cloud Storage Service
https://catalog.lib.kyushu-u.ac.jp/opac_download_md/1563374/IMCOM2016-Chenyutao%20Ke.pdf
九州大学学術情報リポジトリ. Kyushu University Institutional Repository. Cross-group Secret Sharing for Secure Cloud. Storage Service. Ke, Chenyutao.
→ Check Latest Keyword Rankings ←
31 Secret Sharing Approach for Securing Cloud-Based Image ...
https://scholarbank.nus.edu.sg/handle/10635/49410
s secret sharing either by converting the floating point operations to fixed point operations or by excluding the modular prime operation from secret sharing.
→ Check Latest Keyword Rankings ←
32 Secure Cloud Key Management based on Robust Secret ...
https://aircconline.com/csit/papers/vol11/csit110913.pdf
Keywords: Key Management Security, Secret sharing, ... secure storage services, which encrypt data on the client side prior to outsourcing.
→ Check Latest Keyword Rankings ←
33 2412ijccsa06.pdf
http://airccse.org/journal/ijccsa/papers/2412ijccsa06.pdf
Data Security, Cloud, Secret sharing, Information Dispersal ... Several free and reliable online storage services available to the users are Apple iCloud,.
→ Check Latest Keyword Rankings ←
34 A fast and resource efficient FPGA implementation of secret ...
http://mason.gmu.edu/~spudukot/Files/Conferences/DATE18.pdf
applying secret sharing in a distributed storage setting, known as cloud of clouds approach. For this purpose we present a new hardware architecture of a ...
→ Check Latest Keyword Rankings ←
35 SECURE CLOUD STORAGE USING SECRET SHARING ...
https://eprints.kfupm.edu.sa/140755/
This work proposes a new mechanism to increase the user trust in cloud storage using secret sharing technique. The proposed algorithm uses ...
→ Check Latest Keyword Rankings ←
36 Simulating cloud environment for HIS backup using ... - PubMed
https://pubmed.ncbi.nlm.nih.gov/23920538/
However, the need to keep the data confidential dramatically increases the costs of making such backups. Secret sharing is a method to split an original secret ...
→ Check Latest Keyword Rankings ←
37 Secure File Sharing in Multi-clouds using Shamir's Secret ...
https://journals.scholarpublishing.org/index.php/TNC/article/view/2560
However, cloud storage needs a certain level of availability, confidentiality, and integrity. Information sensitivity and value encourage users ...
→ Check Latest Keyword Rankings ←
38 A Hybrid Approach of Secret Sharing with Fragmentation and ...
https://www.riverpublishers.com/journal/journal_articles/RP_Journal_2245-1439_742.pdf
data storage over the cloud is a chief daunting cause for potential adopters ... based on fragmentation, secret sharing and encryption for medical databases.
→ Check Latest Keyword Rankings ←
39 Resilient secret sharing cloud based architecture for data vault
https://www.google.com.pg/patents/US20170005797
A method of securely storing data including: providing, within a secure data storage system, a plurality of secret sharing methods for selection and ...
→ Check Latest Keyword Rankings ←
40 A Single to Multi-Cloud Security based on Secret Sharing ...
https://journals.pen2print.org/index.php/ijr/article/view/440
Main focus of this paper use of multi clouds and data security and reduce security risks and affect the cloud computing user using Shamir's Secret sharing ...
→ Check Latest Keyword Rankings ←
41 SECRET SHARING IN MULTI-CLOUDS
http://www.worldresearchlibrary.org/up_proc/pdf/1386-152204037131-35.pdf
maintaining the security in multi-cloud storage using a ( , )-threshold secret sharing mechanism. We also use multi-level.
→ Check Latest Keyword Rankings ←
42 Simulating Cloud Environment for HIS ... - IOS Press Ebooks
https://ebooks.iospress.nl/pdf/doi/10.3233/978-1-61499-289-9-171
data by the redundancy of cloud storage services themselves. The secret sharing is quite suitable for HIS backup, however,.
→ Check Latest Keyword Rankings ←
43 Cloud Storage for Electronic Health Records Based on Secret ...
https://jpinfotech.org/cloud-storage-for-electronic-health-records-based-on-secret-sharing-with-verifiable-reconstruction-outsourcing/
In this paper, we propose a novel cloud storage system for EHRs which fully ensures the data privacy by employing the Shamir's Secret Sharing.
→ Check Latest Keyword Rankings ←
44 Security Enhancement in Cloud Environment using Secure ...
https://jcomss.fesb.unist.hr/index.php/jcomss/article/view/964
The proposed methodology shares encrypted data over cloud and generated secret key is split into different parts are given to qualified participants (Qn) only ...
→ Check Latest Keyword Rankings ←
45 Performance Evaluation of Secret Sharing Schemes with Data ...
https://www.academia.edu/37221287/Performance_Evaluation_of_Secret_Sharing_Schemes_with_Data_Recovery_in_Secured_and_Reliable_Heterogeneous_Multi_Cloud_Storage
AC-RRNS: Anti-Collusion Secured Data Sharing Scheme for Cloud Storage · AR-RRNS: Configurable reliable distributed data storage systems for Internet of Things to ...
→ Check Latest Keyword Rankings ←
46 Linear Secret Sharing Scheme for Attribute Encryption
http://www.csjournals.com/IJEE/PDF10-2/37.%20Farheen.pdf
challenging problem, especially when big and complex data is present in the cloud as storage. The cloud refers to the information technology environment to ...
→ Check Latest Keyword Rankings ←
47 SECRET SHARING IN MULTI-CLOUDS - Iraj
http://www.iraj.in/journal/journal_file/journal_pdf/5-464-153146276912-16.pdf
International Journal of Advances in Computer Science and Cloud Computing, ... in multi-cloud storage using a (, )-threshold secret sharing mechanism.
→ Check Latest Keyword Rankings ←
48 Secret Shares to Protect Health Records in Cloud
https://www.napier.ac.uk/~/media/worktribe/output-170299/secret-shares-to-protect-health-records-in-cloud-based-infrastructures.pdf
used for the storage of patient information, along with supporting failover and a break-glass policy. Keywords-secret shares, keyless encryption, ...
→ Check Latest Keyword Rankings ←
49 Emerging Cryptographic Technologies - Cloud Gal 42
https://cloudgal42.com/emerging-cryptographic-technologies/
Secret sharing made short (SSMS): Uses a three-phase process: encryption of information; use of information dispersal algorithm (IDA), which is ...
→ Check Latest Keyword Rankings ←
50 Storage Algorithms in Cloud Computing: A Review - IJCST
http://www.ijcst.com/vol8/8.2/20-gagandeep-kaur.pdf
Cloud Computing, Storage, Secret Sharing Algorithm, Information. Dispersal Algorithm. I. Introduction. Cloud computing is a technology which is mainly about ...
→ Check Latest Keyword Rankings ←
51 Secret Image Sharing in Cloud Environment
http://www.j-asc.com/gallery/132-october-1121.pdf
Abstract: Cloud environment provide storage services for data storage and retrieval in better way. Some of their secret images are stored in private cloud ...
→ Check Latest Keyword Rankings ←
52 A secure cloud storage scheme based on secret sharing
https://topic.alibabacloud.com/article/a-secure-cloud-storage-scheme-based-on-secret-sharing_2_6_1868888.html
A secure cloud storage scheme based on secret sharing Zhang Xu Yanhong Zhang Haojian-Wei article on the basis of the analysis of the current network disk ...
→ Check Latest Keyword Rankings ←
53 Deceptive Secret Sharing - Lei Zhang
https://geraldleizhang.com/publications/DSS_DSN18.pdf
and read data from all storage servers. To address these problems, other work has suggested distribut- ing shares across multiple cloud providers [2]. While ...
→ Check Latest Keyword Rankings ←
54 Secret Sharing and Erasure Coding: A Guide for the Aspiring ...
https://blog.ethereum.org/2014/08/16/secret-sharing-erasure-coding-guide-aspiring-dropbox-decentralizer
Currently, if you want your files or data securely backed up "in the cloud", you have three choices - (1) upload them to your own servers, (2) ...
→ Check Latest Keyword Rankings ←
55 (m+1,t+1) Threshold Secret Sharing Scheme Based on ...
http://www.ecice06.com/EN/10.3969/j.issn.1000-3428.2017.01.002
Cloud computing service providers cannot recover the user's privacy data without the user's involvement.Analysis reslut shows that the scheme resolves the ...
→ Check Latest Keyword Rankings ←
56 A Secret Sharing-Based Distributed Cloud System for Privacy ...
http://hcisj.com/data/file/article/2022043003/12-20.pdf
development of cloud-based distributed data storage and blockchain networks, active research on secret sharing has recently been actively ...
→ Check Latest Keyword Rankings ←
57 Robust and Simple N-Party Entangled Authentication Cloud ...
http://bit.kuas.edu.tw/~jihmsp/2013/vol4/JIH-MSP-2013-02-004.pdf
Volume 4, Number 2, April 2013. Robust and Simple N-Party Entangled. Authentication Cloud Storage Protocol Based on. Secret Sharing Scheme. Hongfeng Zhu.
→ Check Latest Keyword Rankings ←
58 Security of Data` in Cloud Computing Based on Advanced ...
https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID3766929_code4549692.pdf?abstractid=3766929&mirid=1
Security of Data` in Cloud Computing Based on Advanced Secret Sharing Key ... further managing secure storage of the on-site encryption keys.
→ Check Latest Keyword Rankings ←
59 Domain 2: Cloud Data Security Flashcards | Quizlet
https://quizlet.com/193288560/domain-2-cloud-data-security-flash-cards/
The proxy instance is a secure machine that handles all cryptographic actions, including key management and storage. Secret Sharing Made Short (SSMS).
→ Check Latest Keyword Rankings ←
60 Security and Privacy Based Data Sharing in Cloud Computing
https://ijirem.org/DOC/9_security-and-privacy-based-data-sharing-in-cloud-computing.pdf
efficient and effective storage services. In order to provide security to the shared secret data, the cryptographic techniques are usually applied.
→ Check Latest Keyword Rankings ←
61 Outsourcing Hierarchical Threshold Secret Sharing Scheme ...
https://www.hindawi.com/journals/scn/2019/6989383/
A cloud service provider (CSP) uses powerful computing resources to help participants complete homomorphic encryption and complex verification ...
→ Check Latest Keyword Rankings ←
62 How to Best Share a Big Secret - Eitan Yaakobi
https://yaakobi.net.technion.ac.il/files/2020/07/83_Secret_SYSTOR18.pdf
ison of state-of-the-art encryption-based and secret sharing data protection approaches. ... data storage and management to a cloud storage provider.
→ Check Latest Keyword Rankings ←
63 Outsourcing secret sharing scheme based on homomorphism ...
https://ietresearch.onlinelibrary.wiley.com/doi/pdf/10.1049/iet-ifs.2017.0026
Nowadays, due to the rapid development of cloud computing and the proliferation of mobile devices, outsourcing data storage. IET Inf. Secur. © ...
→ Check Latest Keyword Rankings ←
64 Threshold Secret Sharing Scheme Based on Multidimensional ...
https://www.jos.org.cn/josen/article/abstract/4943
Cloud storage is a model of data storage where the digital data is stored in logical pools to share data as a service (DaaS) for cloud users ...
→ Check Latest Keyword Rankings ←
65 What is Secret Sharing? | Security Wiki - Double Octopus
https://doubleoctopus.com/security-wiki/encryption-and-cryptography/secret-sharing/
Secret sharing schemes are useful because they allow for more secure storage of highly sensitive data, including encryption keys, missile launch codes, ...
→ Check Latest Keyword Rankings ←
66 Security Enhancement in Cloud Environment using Secure ...
https://hrcak.srce.hr/file/358148
Index Terms—Secret Sharing, Cloud Security, Cloud Comput- ing, Malicious attacker analysis, ... storage of data at remote locations has many benefits, but.
→ Check Latest Keyword Rankings ←
67 Data Dispersion* | CCSP by Alukos
https://ccsp.alukos.com/concepts/data/data-security/data-dispersion/
SMSS uses a three-phase process: Encryption of information; Use of information dispersal algorithm; Splitting the encryption key using the secret sharing ...
→ Check Latest Keyword Rankings ←
68 Storing Credit Card Information Securely using Shamir Secret ...
http://worldcomp-proceedings.com/proc/p2015/SAM9713.pdf
Abstract— Cloud storage and Online database services allow ... the Shamir secret sharing algorithm in multi-provider cloud architecture.
→ Check Latest Keyword Rankings ←
69 Experimental analysis of secret sharing schemes for cloud ...
https://silicon-austria-labs.elsevierpure.com/en/publications/experimental-analysis-of-secret-sharing-schemes-for-cloud-storage-2
Experimental analysis of secret sharing schemes for cloud storage based on rns · Abstract · Keywords · Access to Document · Fingerprint · Cite this.
→ Check Latest Keyword Rankings ←
70 Enhanced Security in Multi Cloud Using Visual Cryptography ...
http://www.ijaprr.com/download/1440398690.pdf
Cryptography and Secret Sharing ... computing, as users often store key information with cloud storage providers, but these providers may be un- trusted.
→ Check Latest Keyword Rankings ←
71 End-to-Same-End Encryption: Modularly Augmenting an App ...
https://www.usenix.org/conference/usenixsecurity22/presentation/chen-long
... secret sharing (PPSS), target end-to-same-end encryption of storage, but need new protocols, whereas most popular commercial cloud storage services are ...
→ Check Latest Keyword Rankings ←
72 A Weighted Threshold Secret Sharing Scheme for Remote ...
https://www.techscience.com/cmc/v58n2/23027
The emergence of cloud storage has brought new opportunities for storage and management of massive remote sensing images with its large storage space, cost ...
→ Check Latest Keyword Rankings ←
73 Evaluation of a Fragmented Secret Share System in Distributed
https://napier-repository.worktribe.com/OutputFile/2455026
Secret Sharing and Multi-Cloud Architecture . ... Cloud storage resources provide quick access to data as computing is usually on the go.
→ Check Latest Keyword Rankings ←
74 An Approach Secret Sharing Algorithm in Cloud ... - IRJET
https://www.irjet.net/archives/V3/i6/IRJET-V3I6238.pdf
Keywords:Shamir's Secret Sharing Algorithm, data integrity, data security, cloud storage, data intrusion. 1. INTRODUCTION. Cloud computing is a low cost ...
→ Check Latest Keyword Rankings ←
75 Long-Term Confidential Secret Sharing-Based Distributed ...
https://tuprints.ulb.tu-darmstadt.de/8762/1/Traverso_Long_Term_Storage_Systems.pdf
storage systems can be based on hierarchical secret sharing schemes by providing ... The challenge here is the technology of multi-cloud, which seems not to ...
→ Check Latest Keyword Rankings ←
76 Secret Sharing and Reliable Cloud Computing - DocPlayer.net
http://docplayer.net/2304527-Secret-sharing-and-reliable-cloud-computing.html
Secret Sharing and Reliable Cloud Computing Yvo Desmedt University College London, UK November, 2011 Yvo c Desmedt OVERVIEW 1.
→ Check Latest Keyword Rankings ←
77 Long-Term Confidential Data Storage by Distributed Secret ...
https://ntnuopen.ntnu.no/ntnu-xmlui/handle/11250/2458158
The mobile application implements secret sharing for confidentiality and uses cloud storage services for storing the shares. A password is divided into ...
→ Check Latest Keyword Rankings ←
78 Secret Manager | Google Cloud
https://cloud.google.com/secret-manager
Secret Manager is a secure and convenient storage system for API keys, passwords, certificates, and other sensitive data. Secret Manager provides a central ...
→ Check Latest Keyword Rankings ←
79 A secure and efficient multi cloud-based data storage and ...
https://www.inderscienceonline.com/doi/abs/10.1504/IJCC.2020.112314
A secure and efficient multi cloud-based data storage and retrieval using hash-based verifiable secret sharing scheme.
→ Check Latest Keyword Rankings ←
80 Secret Sharing and Splitting Based Data Security In Cloud ...
http://ijariie.com/AdminUploadPdf/Secrete_Sharing_And_Splitting_Based_Data_Security_In_Cloud_Computing_ijariie2563.pdf
ABSTRACT. Cloud computing provide low cost storage and computational space. Confidentiality, integrity and access control are the main challenges in cloud.
→ Check Latest Keyword Rankings ←
81 Securing Multi Cloud using Secret Sharing Algorithm - IJSRD
https://ijsrd.com/Article.php?manuscript=IJSRDV6I20088
Single clouds provides the easy data out sourcing with the help of third party storage service provider .the storage provider must assure that ...
→ Check Latest Keyword Rankings ←
82 Simple Approach to Realizing Verifiable Secret Sharing for ...
https://www.x-mol.com/paper/1553089221623967744?recommendPaper=1308118076552876032
When implementing secret sharing in the cloud, if malicious players submit forged shares during the reconstruction process, the reconstructed ...
→ Check Latest Keyword Rankings ←
83 A collaborative secret sharing scheme based on the Chinese ...
https://www.aimspress.com/article/id/3398
Secret sharing (SS) can be used as an important group key management technique for distributed cloud storage and cloud computing. In a traditional threshold ...
→ Check Latest Keyword Rankings ←
84 An Information Sharing Protocol to Minimize Security and ...
http://shabdbooks.com/gallery/311-july2020.pdf
Abstract– A cloud-based big data sharing system uses a storage facility from a cloud ... Keywords– Distributed Storage, Secret Sharing Group Key (SSGK), ...
→ Check Latest Keyword Rankings ←
85 Data Confidentiality in Cloud Storage Protocol Based on ...
https://hal.inria.fr/hal-01416224
Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation ... Abstract : Outsourcing a company's data storage ...
→ Check Latest Keyword Rankings ←
86 SECURED DATA STORAGE AND RETRIEVAL IN ...
http://www.iaset.us/download/archives/2-14-1369641165-3.%20Comp%20Sci%20-%20IJCSE%20-SECURED%20DATA%20STORAGE-%20Jayashri%20V.%20Bharambe.pdf
cloud computing is the cloud data storage, in which subscribers do not have to ... cloud by using the secret sharing algorithm to hide the value of the keys ...
→ Check Latest Keyword Rankings ←
87 SECURE DATA RETRIEVAL IN CLOUD USING LINEAR ...
http://troindia.in/journal/ijcesr/vol5iss3part3/29-33.pdf
Keywords: cloud computing, counter mode,. Linear secret sharing, message ... used for data storage. ... A secret sharing scheme will be linear if the.
→ Check Latest Keyword Rankings ←
88 Is Secret sharing REALLY REALLY REALLY used?
https://blog.computationalcomplexity.org/2018/11/is-secret-sharing-really-really-really.html
I was wondering if Information-Theoretic Secret Sharing is RRR used. ... Many cloud storage solutions use SSS internally to protect data.
→ Check Latest Keyword Rankings ←
89 Distributed storage meets secret sharing on the blockchain
https://experts.illinois.edu/en/publications/distributed-storage-meets-secret-sharing-on-the-blockchain
We use a novel combination of distributed storage, private key encryption, and Shamirs secret sharing scheme to distribute transaction data, ...
→ Check Latest Keyword Rankings ←
90 Fault-Tolerant, Information-Theoretic Secure Cloud Backup ...
https://courses.csail.mit.edu/6.857/2016/files/6.pdf
Chasm secret share the user's private data between N cloud storage services, setting the recoverability threshold to K using.
→ Check Latest Keyword Rankings ←
91 Survey of Cloud Security Techniques
http://cloud.politala.ac.id/politala/1.%20Jurusan/Teknik%20Informatika/19.%20e-journal/Jurnal%20Internasional%20TI/International%20Journal%20For%20Research%20in%20Applied%20Science%20and%20Engineering%20Technology%20(IJRASET)/2015/Volume%203,%20Issue%20III,%20March%202015/fileserve_8.pdf
Abstract— Cloud storage is use to reduce the cost of storage in I.T ... reduce attackers and successful implementation of Shamir's secret sharing algorithm.
→ Check Latest Keyword Rankings ←
92 Cloud Computing Security in Multi-Clouds using Shamir's ...
https://www.ijcaonline.org/archives/volume155/number13/26662-26662-2016912051?format=pdf
Data Integrity and Confidentiality can be protected by using secret sharing schemes. To prevent service availability failure, multi-cloud data storage ...
→ Check Latest Keyword Rankings ←
93 A COMPARATIVE STUDY OF THE SECRET SHARING ...
https://zenodo.org/record/1438582
Data encryption, Homomorphic Encryption, Secret Sharing algorithms and Private Information Retrieval (PIR) are the techniques widely used for ...
→ Check Latest Keyword Rankings ←
94 Security In Infra Cloud Storage with Sensitive Information Hiding
http://www.ijsred.com/volume3/issue1/IJSRED-V3I1P9.pdf
distributed storage mechanisms based on secret sharing schemes and error correction codes, which spread data over multiple cloud storage provider.
→ Check Latest Keyword Rankings ←
95 A Novel Safe File Sharing Method Based on Cloud Storage ...
http://article.nadiapub.com/IJSIA/vol9_no7/17.pdf
agreement mechanism、Shamir secret sharing algorithm. ... sharing in cloud storage. Keywords: Cloud storage, DHT networks, file sharing, security technology.
→ Check Latest Keyword Rankings ←
96 Social Secret Sharing in Cloud Computing Using a New Trust ...
https://faculty.eng.fau.edu/nojoumian/Files/Publication/SSSCloud.pdf
Keywords: trust modeling, secret sharing, cloud computing. I. INTRODUCTION ... “storage”, and “software” as a service. As a result, consumers.
→ Check Latest Keyword Rankings ←


2516 w. foster chicago il

homes for sale ojochal costa rica

action bronson ringtones

actavis purchase

wrigleyville hotel construction

visit mosquito bay

radcliffe surgery atherstone

orlando heritage hotel

houston hobby google maps

hotels in waukegan with jacuzzi

what happens if cavities go untreated

cloud storage internode

how do you figure out rvu

just ordered iphone 5

balearic music download

var cloud services

authors coffee

what do no pun intended mean

pretty trap tennessee williams

dexia assistance adres

heyne building uh address

albuquerque digital channel list

keefe j.w. learning style an overview

výpredaj fitness

travel to the gower

building credit score from scratch

make money online stripping

lower kidney pain

zip code newbury nh

recent united states news