2020
DOI: 10.4018/ijec.2020010101
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing

Abstract: Security is a crucial problem in Cloud computing. Storing and accessing the data in the Cloud is very popular nowadays but the security of data is still lagging behind. Secret sharing schemes are widely used to improve the security of data. In this article, a threshold secret sharing scheme using Newton divided difference interpolating polynomial (TSSNIP) is proposed in a distributed Cloud environment to enhance security of keys used for encryption. The proposed method uses a Newton divided difference interpol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…However, its recovery mode is the same type as Reference 20. The work in Reference 31 proposes a general PSIS construction method, which is different from ours. Compared with Reference 33, as far as the image recovery mode is concerned, our proposed scheme is to present the original image content at a finer granularity.…”
Section: Comparisons With Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…However, its recovery mode is the same type as Reference 20. The work in Reference 31 proposes a general PSIS construction method, which is different from ours. Compared with Reference 33, as far as the image recovery mode is concerned, our proposed scheme is to present the original image content at a finer granularity.…”
Section: Comparisons With Related Workmentioning
confidence: 99%
“…It is suitable for image secret sharing of distributed data storage such as IoT, cloud storage, and so forth. [28][29][30][31] The threshold-based secret sharing scheme was first proposed by Shamir. 27 With the (k, n)-threshold in cryptography, a secret is used to generate n shadows.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To improve the security of keys used for encryption, [10] proposes a threshold secret sharing system employing Newton division difference interpolating polynomial in a distributed Cloud context.…”
Section: Related Workmentioning
confidence: 99%
“…reference herein 25 to store the key in a protected manner. In the SSS progress, the key is partitioned into many shares and stored on n resource providers.…”
Section: F I G U R E 6 Security Enhancement Of Sat Techniquementioning
confidence: 99%