2017
DOI: 10.1007/s00778-017-0470-9
|View full text |Cite
|
Sign up to set email alerts
|

Secret sharing for cloud data security: a survey

Abstract: Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud technologies. Various approaches, i.e., data encryption, anonymization, replication and verification, help enforce different facets of data security. Secret sharing is a particularly interesting cryptographic technique. Its most advanced variants indeed simulta… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(25 citation statements)
references
References 98 publications
(391 reference statements)
0
20
0
Order By: Relevance
“…However, this approach does not target security as an objective but has the objective to maximize the profit for providers. Other related work on using secret sharing for secure cloud storage, as for example, surveyed in Attasena et al (2017), has not addressed the usable configuration management problem yet.…”
Section: Related Workmentioning
confidence: 99%
“…However, this approach does not target security as an objective but has the objective to maximize the profit for providers. Other related work on using secret sharing for secure cloud storage, as for example, surveyed in Attasena et al (2017), has not addressed the usable configuration management problem yet.…”
Section: Related Workmentioning
confidence: 99%
“…If there are malicious participants in the system, the sharing secret may not be reconstructed correctly, and the malicious participants cannot be identified. To solve this problem, some verifiable secret sharing schemes have been proposed by different researchers [27]. In addition to key escrow, secret sharing schemes can also be used for group session key sharing and cloud data sharing or computing [27]- [29].…”
Section: ) Secret Sharing Schemementioning
confidence: 99%
“…It addresses the trust issue between three parties (CSP, investigators, victim) by an authentication mechanism for each party to unlock one of the three‐part keys used in the SSS key sharing mechanism, which can be collaborated to find the ECC private (decryption) key. This method is used to decrypt and display the logs in a read‐only manner …”
Section: Proposed Schemementioning
confidence: 99%