High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

An Approach Secret Sharing Algorithm to Provide Security to Multi Cloud Data Storage


Prajakta Kshirsagar , SKNCOE; Trupti Gurav, SKNCOE


Data Security, Integrity, Multi-Cloud, Shamir’s Secret Sharing Algorithm, Storage


Cloud computing is an emerging technology that is at the top in the IT industry. In recent years use of Cloud computing in different mode like cloud storage, cloud hosting, cloud servers are increased in industries and other organization as per requirements. These days rapid use of cloud computing in several IT industries and organizations offers new software at a reasonable cost. Data is used, processed and stored in cloud environment all over the world. With, this there is unlimited benefits but by considering the power, stability and the security of cloud one can’t ignore different threats, security risks to user’s data on cloud storage. So it is not very promising to depend on a single service provider for outsourced data. However, single cloud providers are less popular among customers because of service unavailability and malicious insiders that exists in single cloud. In proposed system we are implementing the concept of multi-cloud storage where rather storing complete file on single cloud system will split the file in different chunks after encrypt and store it on different cloud. It is one of the main hurdle to share sensitive data with cloud storage providers. For securing outsourced data encryption and secret sharing algorithms are the techniques used extensively to secure outsourcing data. Managing CIA (Confidentiality, Integrity, and Availability) is a main issue and due to this issues, users are opting for multi-cloud as these are secured with various techniques and one of these techniques is secret sharing algorithms. The paper applies Shamir’s Secret Sharing Algorithm which will address possible methodologies and solutions to secure outsourcing data in multi clouds. The main focus of this paper will be on data security and provide integrity.

Other Details

Paper ID: IJSRDV5I41327
Published in: Volume : 5, Issue : 4
Publication Date: 01/07/2017
Page(s): 1791-1795

Article Preview

Download Article