Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

Publicly Verifiable Secret Sharing for Cloud-Based Key Management

Running the key-management service of cryptographic systems in the cloud is an attractive cost saving proposition. Supporting key-recovery is an essential component of every key-management service. We observe that to verifiably support key-recovery in a public cloud, it is essential to use publicly verifiable secret-sharing (PVSS) schemes. In addition, a holistic approach to security must be ta...

متن کامل

A Publicly Verifiable Dynamic Secret Sharing Protocol for Secure and Dependable Data Storage in Cloud Computing

Data storage is an important application of cloud computing, where the users can remotely store their data into the cloud. This new paradigm of data storage service also introduces security challenges, such as Confidentiality, Integrity and Availability of data. The protection of these issues in cloud is a very challenging and potentially formidable task, especially for the users with constrain...

متن کامل

Secure Data Outsourcing on Cloud Using Secret Sharing Scheme

Data Outsourcing in Cloud (DOC) has its exclusive benefits like low-cost, lower management overhead, elasticity of storage etc and these encourage organizations to use cloud computing to outsource massive amount of data to the cloud providers. The outsourced environment of the cloud and its inherent loss of control cause risk of exposing highly sensitive data to internal or external attacks. Tr...

متن کامل

On alternative approach for verifiable secret sharing

The proposed approach works for any underlying secret sharing scheme. It is based on the concept of verification sets of participants, related to authorized set of participants. The participants interact (no third party involved) in order to check validity of their shares before they are pooled for secret recovery. Verification efficiency does not depend on the number of faulty participants.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2018

ISSN: 2169-3536

DOI: 10.1109/access.2018.2857205