Privacy Preservation using Shamir’s Secrete Sharing Algorithm for Data Storage Security
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 2
Abstract
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security. Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.
Authors and Affiliations
Tejashree Paigude , Prof. T. A. Chavan
Weakly Supervised Critical Nugget Finding Algorithm for Improving Classification Accuracy
Accuracy is more important in data classification. An elimination of noisy data, attribute and property discovery is a major consideration in the proposed research. From the overall given population the system predicts t...
An Efficient Classification Approach for Novel Class Detection by Evolving Feature Datastreams
Data stream classification has been an extensively studied research problem in recent years. data stream classification requires efficient and effective techniques that are significantly different from static data classi...
Password-Only Authenticated Key Exchange Using Distributed Server
Authentication using Password-authenticated key exchange using distributed server (PAKEUDE) is done where a cryptographic key - exchange of messages. Database of all passwords to authenticate clients are stored in a dist...
FPGA Implementation of Lifting DWT based LSB Steganography using Micro Blaze Processor
We present an information hiding technique that utilizes lifting schemes to effectively hide information in images. A successful information hiding should result in the extraction of the hidden data from the image with h...
Energy Based Optimal Relaying in Heterogeneous Radio Access Networks
Due to recent trends in mobile communication system, much attention has be given to heterogeneous networks in which a mobile equipment is able to access multiple networks that are present in a locality. Here each random...