Title :
Survey on secret sharing scheme with deduplication in cloud computing
Author :
Dharani P; Berlin M.A.
Author_Institution :
Department of computer science and engineering, RMD Engineering college, Tamilnadu, India
Abstract :
Data deduplication is one of the techniques used for eliminating duplicate copies of data which is widely used in cloud to reduce storage space and increase bandwidth. Convergent encryption has been extensively adopted for secure deduplication, in order to use efficiently and reliably manage a huge number of convergent keys. A baseline approach named as Dekey is used to distribute the convergent key which would be shared across multiple servers. But implementation of Dekey using the Ramp secret sharing scheme has some limitations; a heavy computational cost is required to make n shares and recover the secret as a solution to this problem. Hence a new (k, L, n)-threshold ramp scheme (extension of existing ramp scheme) is proposed which is perfect, idle and faster secret sharing scheme, every combination of k or more participants can recover the secret, but every group of less than k participants cannot obtain any information about the secret.
Keywords :
"Polynomials","Encryption","Servers","Interpolation","Computational efficiency","Computational modeling"
Conference_Titel :
Intelligent Systems and Control (ISCO), 2015 IEEE 9th International Conference on
DOI :
10.1109/ISCO.2015.7282378