DeepAI AI Chat
Log In Sign Up

Secret Sharing for Cloud Data Security

by   Varunya Attasena, et al.

Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud technologies. Various approaches, i.e., data encryption, anonymization, replication and verification, help enforce different facets of data security. Secret sharing is a particularly interesting cryptographic technique. Its most advanced variants indeed simultaneously enforce data privacy, availability and integrity, while allowing computation on encrypted data. The aim of this paper is thus to wholly survey secret sharing schemes with respect to data security, data access and costs in the pay-as-you-go paradigm.


page 15

page 21


S4: A New Secure Scheme for Enforcing Privacy in Cloud Data Warehouses

Outsourcing data into the cloud becomes popular thanks to the pay-as-you...

Secure Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing

Reversible data hiding in encrypted images (RDH-EI) has attracted increa...

Improved hierarchical role based access control model for cloud computing

Cloud computing is considered as the one of the most dominant paradigm i...

Secure Computation on Additive Shares

The rapid development of cloud computing has probably benefited each of ...

A survey study on major technical barriers affecting the decision to adopt cloud services

In the context of cloud computing, risks associated with underlying tech...

The Realizations of Steganography in Encrypted Domain

With the popularization and application of privacy protection technologi...

Anonymous and confidential file sharing over untrusted clouds

Using public cloud services for storing and sharing confidential data re...