2016
DOI: 10.14738/tnc.46.2560
|View full text |Cite
|
Sign up to set email alerts
|

Secure File Sharing in Multi-clouds using Shamir’s Secret Sharing Scheme

Abstract: Cloud computing is a significant model for permitting on-demand network access to shared data, software's, infrastructure, and platform resources. However, cloud storage needs a certain level of availability, confidentiality, and integrity. Information sensitivity and value encourage users to select a highly secure protocol. This work proposes a new mechanism to increase the user trust in cloud computing using the secret sharing technique. The proposed algorithm is using Base64 encoding to convert any file typ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…In [18], the authors came forward with a new model that used Shamir secret sharing algorithm and base64 encoding scheme for providing secure sharing of files in multi-cloud environments. This scheme prevents against attacks by malicious insiders but does not involve file indexing which makes the file retrieval process difficult and complex.…”
Section: Reference Cryptographic Techniquementioning
confidence: 99%
“…In [18], the authors came forward with a new model that used Shamir secret sharing algorithm and base64 encoding scheme for providing secure sharing of files in multi-cloud environments. This scheme prevents against attacks by malicious insiders but does not involve file indexing which makes the file retrieval process difficult and complex.…”
Section: Reference Cryptographic Techniquementioning
confidence: 99%
“…It is suitable for image secret sharing of distributed data storage such as IoT, cloud storage, and so forth. [28][29][30][31] The threshold-based secret sharing scheme was first proposed by Shamir. 27 With the (k, n)-threshold in cryptography, a secret is used to generate n shadows.…”
Section: Introductionmentioning
confidence: 99%
“…The second type of schemes are mainly based on Shamir's threshold secret sharing scheme, 27 in which polynomial interpolation is used to share and accurately recover the secret. It is suitable for image secret sharing of distributed data storage such as IoT, cloud storage, and so forth 28‐31 …”
Section: Introductionmentioning
confidence: 99%