“…Compromised Key, outsider attack, Data Loss Secret Sharing Schemes, Visual Cryptography, dummy shares, replica keys [5], [6], [7], [8], [9], [10]. [11], [12], [13], [14], [15], [32], [45] Data Security Weak key management and cryptographic algorithms, Confidentiality, Access Control, Trust Management…”