2020
DOI: 10.24138/jcomss.v16i3.964
|View full text |Cite
|
Sign up to set email alerts
|

Security Enhancement in Cloud Environment using Secure Secret Key Sharing

Abstract: Cloud Computing has achieved long dreamed vision of developments in IT industry such as remote storage services or privacy solutions. It is a data storage model in which data is preserved, controlled and presented over the network users. However, cloud storage gives rise to security concerns. Preserving the secrecy in a group is one of the major research issue in cloud store. This paper is focused on Secure Secret Sharing (SSS) technique which is being recognized as one of the leading method to secure the sens… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…Most of the data leakage, security hacks and attacks happens during the process of data transfer by taking advantage of the security discrepencies or vulnerabilities of computing, storage, and networking devices within the cloud datacentre [84][85][86][87][88][89][90][91]. Moreover, the co-residency of virtual machines of multiple users on a common physical server often leads to malicious activities like, data hampering and leakage of cloud user's confidential data [10,[92][93][94][95][96][97][98][99][100][101][102]. The malicious user or hacker launches one or multiple of virtual machines and exploits multiple network routes by achieving co-residency with the target virtual machine [29,[103][104][105][106][107][108][109][110][111][112].…”
Section: Introductionmentioning
confidence: 99%
“…Most of the data leakage, security hacks and attacks happens during the process of data transfer by taking advantage of the security discrepencies or vulnerabilities of computing, storage, and networking devices within the cloud datacentre [84][85][86][87][88][89][90][91]. Moreover, the co-residency of virtual machines of multiple users on a common physical server often leads to malicious activities like, data hampering and leakage of cloud user's confidential data [10,[92][93][94][95][96][97][98][99][100][101][102]. The malicious user or hacker launches one or multiple of virtual machines and exploits multiple network routes by achieving co-residency with the target virtual machine [29,[103][104][105][106][107][108][109][110][111][112].…”
Section: Introductionmentioning
confidence: 99%
“…At present, cryptography has been widely used in data access control, such as digital signature [14,15], secret sharing [16,17], ABE [18], access control encryption (ACE) [19] and so on.…”
Section: Introductionmentioning
confidence: 99%