Shamir's Threshold Scheme to Ensure Security in Cloud Computing Services

Article Preview

Abstract:

Cloud computing system preserves the security and privacy of a user's data by replicating data among several clouds and by using the secret sharing approach. It uses the database management system DBMS (data source) to manage and control the operations between the clients and them ulti-clouds inside a cloud service provider [1]. Generally speaking, The Shamir's threshold scheme is suitable for the shares in the cloud computing. The Shamir's threshold scheme as a secret sharing scheme will attract more attention in the cloud computing in future.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3632-3635

Citation:

Online since:

March 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Daniel Benton and Walid Negm: Waters, 2010. 5-11.

Google Scholar

[2] Chen Jinyin, Yang Dongyong: Applied Mathematics & Information Sciences. (2013), pp.149-153.

Google Scholar

[3] Mohammed A. AlZain, Ben Soh, Eric Pardede: Journal of Service Science Research (2012) , pp.49-70.

Google Scholar

[4] Menezes A, van Oorschot PC, Vanstone SA: Handbook of applied cryptography. CRC Press; (1997).

Google Scholar