2016
DOI: 10.1080/19393555.2015.1134732
|View full text |Cite
|
Sign up to set email alerts
|

Towards the design of a secure data outsourcing using fragmentation and secret sharing scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…Any unintentional disclosure of information to any unauthorized person can result in a distress situation among individuals. Hence, a two-stage information protection mechanism is proposed in this system: (I) information granulation [55], and (II) secret sharing scheme [38]. In the first stage, the individual's data is divided into three different data tables, i.e., L-I, L-II, and L-III.…”
Section: Information Protectionmentioning
confidence: 99%
“…Any unintentional disclosure of information to any unauthorized person can result in a distress situation among individuals. Hence, a two-stage information protection mechanism is proposed in this system: (I) information granulation [55], and (II) secret sharing scheme [38]. In the first stage, the individual's data is divided into three different data tables, i.e., L-I, L-II, and L-III.…”
Section: Information Protectionmentioning
confidence: 99%
“…The model also reveals information by queries without deciphering the essential attributes of the subsets [ 19 ]. Sareen et al contribute to their work by proposing a new model to protect the confidentiality of outsourced data [ 27 ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Reconstruction implementation can only be done by the knowledge of the three ordered pairs {( x i , P ( x i )), i = 1, 2, 3} corresponding to the three CRs which kept stored in DBMS. The decryption implemented using Newton-Gregory’s divided difference interpolation, as shown in Table 6 , which will reconstruct the polynomial and reveal the original value of NIDN as the constant part of it a 0 [ 27 ].…”
Section: Proposed Modelmentioning
confidence: 99%
“…The user data are first divided into multiple fragments so as to satisfy the confidentiality constraints. In the second stage, a secret sharing scheme is applied to the sensitive attribute itself that splits the value of the sensitive attribute into secret shares (18).…”
Section: Information Protectionmentioning
confidence: 99%