Secret sharing for cloud data security: a survey
Abstract Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud technologies. Various approaches, i.e...
Ausführliche Beschreibung
Autor*in: |
Attasena, Varunya [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2017 |
---|
Schlagwörter: |
---|
Anmerkung: |
© Springer-Verlag Berlin Heidelberg 2017 |
---|
Übergeordnetes Werk: |
Enthalten in: The VLDB journal - Springer Berlin Heidelberg, 1992, 26(2017), 5 vom: 29. Juni, Seite 657-681 |
---|---|
Übergeordnetes Werk: |
volume:26 ; year:2017 ; number:5 ; day:29 ; month:06 ; pages:657-681 |
Links: |
---|
DOI / URN: |
10.1007/s00778-017-0470-9 |
---|
Katalog-ID: |
OLC2051361320 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC2051361320 | ||
003 | DE-627 | ||
005 | 20230502152015.0 | ||
007 | tu | ||
008 | 200819s2017 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s00778-017-0470-9 |2 doi | |
035 | |a (DE-627)OLC2051361320 | ||
035 | |a (DE-He213)s00778-017-0470-9-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 004 |q VZ |
100 | 1 | |a Attasena, Varunya |e verfasserin |0 (orcid)0000-0002-3652-9032 |4 aut | |
245 | 1 | 0 | |a Secret sharing for cloud data security: a survey |
264 | 1 | |c 2017 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © Springer-Verlag Berlin Heidelberg 2017 | ||
520 | |a Abstract Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud technologies. Various approaches, i.e., data encryption, anonymization, replication and verification, help enforce different facets of data security. Secret sharing is a particularly interesting cryptographic technique. Its most advanced variants indeed simultaneously enforce data privacy, availability and integrity, while allowing computation on encrypted data. The aim of this paper is thus to wholly survey secret sharing schemes with respect to data security, data access and costs in the pay-as-you-go paradigm. | ||
650 | 4 | |a Cloud computing | |
650 | 4 | |a Secret sharing | |
650 | 4 | |a Data privacy | |
650 | 4 | |a Data availability | |
650 | 4 | |a Data integrity | |
650 | 4 | |a Data access | |
700 | 1 | |a Darmont, Jérôme |0 (orcid)0000-0003-1491-384X |4 aut | |
700 | 1 | |a Harbi, Nouria |4 aut | |
773 | 0 | 8 | |i Enthalten in |t The VLDB journal |d Springer Berlin Heidelberg, 1992 |g 26(2017), 5 vom: 29. Juni, Seite 657-681 |w (DE-627)170933059 |w (DE-600)1129061-4 |w (DE-576)032856466 |x 1066-8888 |7 nnns |
773 | 1 | 8 | |g volume:26 |g year:2017 |g number:5 |g day:29 |g month:06 |g pages:657-681 |
856 | 4 | 1 | |u https://doi.org/10.1007/s00778-017-0470-9 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_30 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_2018 | ||
912 | |a GBV_ILN_4266 | ||
912 | |a GBV_ILN_4277 | ||
912 | |a GBV_ILN_4311 | ||
951 | |a AR | ||
952 | |d 26 |j 2017 |e 5 |b 29 |c 06 |h 657-681 |
author_variant |
v a va j d jd n h nh |
---|---|
matchkey_str |
article:10668888:2017----::erthrnfrludtscr |
hierarchy_sort_str |
2017 |
publishDate |
2017 |
allfields |
10.1007/s00778-017-0470-9 doi (DE-627)OLC2051361320 (DE-He213)s00778-017-0470-9-p DE-627 ger DE-627 rakwb eng 004 VZ Attasena, Varunya verfasserin (orcid)0000-0002-3652-9032 aut Secret sharing for cloud data security: a survey 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag Berlin Heidelberg 2017 Abstract Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud technologies. Various approaches, i.e., data encryption, anonymization, replication and verification, help enforce different facets of data security. Secret sharing is a particularly interesting cryptographic technique. Its most advanced variants indeed simultaneously enforce data privacy, availability and integrity, while allowing computation on encrypted data. The aim of this paper is thus to wholly survey secret sharing schemes with respect to data security, data access and costs in the pay-as-you-go paradigm. Cloud computing Secret sharing Data privacy Data availability Data integrity Data access Darmont, Jérôme (orcid)0000-0003-1491-384X aut Harbi, Nouria aut Enthalten in The VLDB journal Springer Berlin Heidelberg, 1992 26(2017), 5 vom: 29. Juni, Seite 657-681 (DE-627)170933059 (DE-600)1129061-4 (DE-576)032856466 1066-8888 nnns volume:26 year:2017 number:5 day:29 month:06 pages:657-681 https://doi.org/10.1007/s00778-017-0470-9 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_24 GBV_ILN_30 GBV_ILN_70 GBV_ILN_2018 GBV_ILN_4266 GBV_ILN_4277 GBV_ILN_4311 AR 26 2017 5 29 06 657-681 |
spelling |
10.1007/s00778-017-0470-9 doi (DE-627)OLC2051361320 (DE-He213)s00778-017-0470-9-p DE-627 ger DE-627 rakwb eng 004 VZ Attasena, Varunya verfasserin (orcid)0000-0002-3652-9032 aut Secret sharing for cloud data security: a survey 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag Berlin Heidelberg 2017 Abstract Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud technologies. Various approaches, i.e., data encryption, anonymization, replication and verification, help enforce different facets of data security. Secret sharing is a particularly interesting cryptographic technique. Its most advanced variants indeed simultaneously enforce data privacy, availability and integrity, while allowing computation on encrypted data. The aim of this paper is thus to wholly survey secret sharing schemes with respect to data security, data access and costs in the pay-as-you-go paradigm. Cloud computing Secret sharing Data privacy Data availability Data integrity Data access Darmont, Jérôme (orcid)0000-0003-1491-384X aut Harbi, Nouria aut Enthalten in The VLDB journal Springer Berlin Heidelberg, 1992 26(2017), 5 vom: 29. Juni, Seite 657-681 (DE-627)170933059 (DE-600)1129061-4 (DE-576)032856466 1066-8888 nnns volume:26 year:2017 number:5 day:29 month:06 pages:657-681 https://doi.org/10.1007/s00778-017-0470-9 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_24 GBV_ILN_30 GBV_ILN_70 GBV_ILN_2018 GBV_ILN_4266 GBV_ILN_4277 GBV_ILN_4311 AR 26 2017 5 29 06 657-681 |
allfields_unstemmed |
10.1007/s00778-017-0470-9 doi (DE-627)OLC2051361320 (DE-He213)s00778-017-0470-9-p DE-627 ger DE-627 rakwb eng 004 VZ Attasena, Varunya verfasserin (orcid)0000-0002-3652-9032 aut Secret sharing for cloud data security: a survey 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag Berlin Heidelberg 2017 Abstract Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud technologies. Various approaches, i.e., data encryption, anonymization, replication and verification, help enforce different facets of data security. Secret sharing is a particularly interesting cryptographic technique. Its most advanced variants indeed simultaneously enforce data privacy, availability and integrity, while allowing computation on encrypted data. The aim of this paper is thus to wholly survey secret sharing schemes with respect to data security, data access and costs in the pay-as-you-go paradigm. Cloud computing Secret sharing Data privacy Data availability Data integrity Data access Darmont, Jérôme (orcid)0000-0003-1491-384X aut Harbi, Nouria aut Enthalten in The VLDB journal Springer Berlin Heidelberg, 1992 26(2017), 5 vom: 29. Juni, Seite 657-681 (DE-627)170933059 (DE-600)1129061-4 (DE-576)032856466 1066-8888 nnns volume:26 year:2017 number:5 day:29 month:06 pages:657-681 https://doi.org/10.1007/s00778-017-0470-9 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_24 GBV_ILN_30 GBV_ILN_70 GBV_ILN_2018 GBV_ILN_4266 GBV_ILN_4277 GBV_ILN_4311 AR 26 2017 5 29 06 657-681 |
allfieldsGer |
10.1007/s00778-017-0470-9 doi (DE-627)OLC2051361320 (DE-He213)s00778-017-0470-9-p DE-627 ger DE-627 rakwb eng 004 VZ Attasena, Varunya verfasserin (orcid)0000-0002-3652-9032 aut Secret sharing for cloud data security: a survey 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag Berlin Heidelberg 2017 Abstract Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud technologies. Various approaches, i.e., data encryption, anonymization, replication and verification, help enforce different facets of data security. Secret sharing is a particularly interesting cryptographic technique. Its most advanced variants indeed simultaneously enforce data privacy, availability and integrity, while allowing computation on encrypted data. The aim of this paper is thus to wholly survey secret sharing schemes with respect to data security, data access and costs in the pay-as-you-go paradigm. Cloud computing Secret sharing Data privacy Data availability Data integrity Data access Darmont, Jérôme (orcid)0000-0003-1491-384X aut Harbi, Nouria aut Enthalten in The VLDB journal Springer Berlin Heidelberg, 1992 26(2017), 5 vom: 29. Juni, Seite 657-681 (DE-627)170933059 (DE-600)1129061-4 (DE-576)032856466 1066-8888 nnns volume:26 year:2017 number:5 day:29 month:06 pages:657-681 https://doi.org/10.1007/s00778-017-0470-9 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_24 GBV_ILN_30 GBV_ILN_70 GBV_ILN_2018 GBV_ILN_4266 GBV_ILN_4277 GBV_ILN_4311 AR 26 2017 5 29 06 657-681 |
allfieldsSound |
10.1007/s00778-017-0470-9 doi (DE-627)OLC2051361320 (DE-He213)s00778-017-0470-9-p DE-627 ger DE-627 rakwb eng 004 VZ Attasena, Varunya verfasserin (orcid)0000-0002-3652-9032 aut Secret sharing for cloud data security: a survey 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag Berlin Heidelberg 2017 Abstract Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud technologies. Various approaches, i.e., data encryption, anonymization, replication and verification, help enforce different facets of data security. Secret sharing is a particularly interesting cryptographic technique. Its most advanced variants indeed simultaneously enforce data privacy, availability and integrity, while allowing computation on encrypted data. The aim of this paper is thus to wholly survey secret sharing schemes with respect to data security, data access and costs in the pay-as-you-go paradigm. Cloud computing Secret sharing Data privacy Data availability Data integrity Data access Darmont, Jérôme (orcid)0000-0003-1491-384X aut Harbi, Nouria aut Enthalten in The VLDB journal Springer Berlin Heidelberg, 1992 26(2017), 5 vom: 29. Juni, Seite 657-681 (DE-627)170933059 (DE-600)1129061-4 (DE-576)032856466 1066-8888 nnns volume:26 year:2017 number:5 day:29 month:06 pages:657-681 https://doi.org/10.1007/s00778-017-0470-9 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_24 GBV_ILN_30 GBV_ILN_70 GBV_ILN_2018 GBV_ILN_4266 GBV_ILN_4277 GBV_ILN_4311 AR 26 2017 5 29 06 657-681 |
language |
English |
source |
Enthalten in The VLDB journal 26(2017), 5 vom: 29. Juni, Seite 657-681 volume:26 year:2017 number:5 day:29 month:06 pages:657-681 |
sourceStr |
Enthalten in The VLDB journal 26(2017), 5 vom: 29. Juni, Seite 657-681 volume:26 year:2017 number:5 day:29 month:06 pages:657-681 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Cloud computing Secret sharing Data privacy Data availability Data integrity Data access |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
The VLDB journal |
authorswithroles_txt_mv |
Attasena, Varunya @@aut@@ Darmont, Jérôme @@aut@@ Harbi, Nouria @@aut@@ |
publishDateDaySort_date |
2017-06-29T00:00:00Z |
hierarchy_top_id |
170933059 |
dewey-sort |
14 |
id |
OLC2051361320 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2051361320</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230502152015.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2017 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s00778-017-0470-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2051361320</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s00778-017-0470-9-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Attasena, Varunya</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(orcid)0000-0002-3652-9032</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secret sharing for cloud data security: a survey</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2017</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer-Verlag Berlin Heidelberg 2017</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud technologies. Various approaches, i.e., data encryption, anonymization, replication and verification, help enforce different facets of data security. Secret sharing is a particularly interesting cryptographic technique. Its most advanced variants indeed simultaneously enforce data privacy, availability and integrity, while allowing computation on encrypted data. The aim of this paper is thus to wholly survey secret sharing schemes with respect to data security, data access and costs in the pay-as-you-go paradigm.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Secret sharing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data availability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data integrity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data access</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Darmont, Jérôme</subfield><subfield code="0">(orcid)0000-0003-1491-384X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Harbi, Nouria</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">The VLDB journal</subfield><subfield code="d">Springer Berlin Heidelberg, 1992</subfield><subfield code="g">26(2017), 5 vom: 29. Juni, Seite 657-681</subfield><subfield code="w">(DE-627)170933059</subfield><subfield code="w">(DE-600)1129061-4</subfield><subfield code="w">(DE-576)032856466</subfield><subfield code="x">1066-8888</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:26</subfield><subfield code="g">year:2017</subfield><subfield code="g">number:5</subfield><subfield code="g">day:29</subfield><subfield code="g">month:06</subfield><subfield code="g">pages:657-681</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s00778-017-0470-9</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_30</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4266</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4277</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4311</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">26</subfield><subfield code="j">2017</subfield><subfield code="e">5</subfield><subfield code="b">29</subfield><subfield code="c">06</subfield><subfield code="h">657-681</subfield></datafield></record></collection>
|
author |
Attasena, Varunya |
spellingShingle |
Attasena, Varunya ddc 004 misc Cloud computing misc Secret sharing misc Data privacy misc Data availability misc Data integrity misc Data access Secret sharing for cloud data security: a survey |
authorStr |
Attasena, Varunya |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)170933059 |
format |
Article |
dewey-ones |
004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
1066-8888 |
topic_title |
004 VZ Secret sharing for cloud data security: a survey Cloud computing Secret sharing Data privacy Data availability Data integrity Data access |
topic |
ddc 004 misc Cloud computing misc Secret sharing misc Data privacy misc Data availability misc Data integrity misc Data access |
topic_unstemmed |
ddc 004 misc Cloud computing misc Secret sharing misc Data privacy misc Data availability misc Data integrity misc Data access |
topic_browse |
ddc 004 misc Cloud computing misc Secret sharing misc Data privacy misc Data availability misc Data integrity misc Data access |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
The VLDB journal |
hierarchy_parent_id |
170933059 |
dewey-tens |
000 - Computer science, knowledge & systems |
hierarchy_top_title |
The VLDB journal |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)170933059 (DE-600)1129061-4 (DE-576)032856466 |
title |
Secret sharing for cloud data security: a survey |
ctrlnum |
(DE-627)OLC2051361320 (DE-He213)s00778-017-0470-9-p |
title_full |
Secret sharing for cloud data security: a survey |
author_sort |
Attasena, Varunya |
journal |
The VLDB journal |
journalStr |
The VLDB journal |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2017 |
contenttype_str_mv |
txt |
container_start_page |
657 |
author_browse |
Attasena, Varunya Darmont, Jérôme Harbi, Nouria |
container_volume |
26 |
class |
004 VZ |
format_se |
Aufsätze |
author-letter |
Attasena, Varunya |
doi_str_mv |
10.1007/s00778-017-0470-9 |
normlink |
(ORCID)0000-0002-3652-9032 (ORCID)0000-0003-1491-384X |
normlink_prefix_str_mv |
(orcid)0000-0002-3652-9032 (orcid)0000-0003-1491-384X |
dewey-full |
004 |
title_sort |
secret sharing for cloud data security: a survey |
title_auth |
Secret sharing for cloud data security: a survey |
abstract |
Abstract Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud technologies. Various approaches, i.e., data encryption, anonymization, replication and verification, help enforce different facets of data security. Secret sharing is a particularly interesting cryptographic technique. Its most advanced variants indeed simultaneously enforce data privacy, availability and integrity, while allowing computation on encrypted data. The aim of this paper is thus to wholly survey secret sharing schemes with respect to data security, data access and costs in the pay-as-you-go paradigm. © Springer-Verlag Berlin Heidelberg 2017 |
abstractGer |
Abstract Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud technologies. Various approaches, i.e., data encryption, anonymization, replication and verification, help enforce different facets of data security. Secret sharing is a particularly interesting cryptographic technique. Its most advanced variants indeed simultaneously enforce data privacy, availability and integrity, while allowing computation on encrypted data. The aim of this paper is thus to wholly survey secret sharing schemes with respect to data security, data access and costs in the pay-as-you-go paradigm. © Springer-Verlag Berlin Heidelberg 2017 |
abstract_unstemmed |
Abstract Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud technologies. Various approaches, i.e., data encryption, anonymization, replication and verification, help enforce different facets of data security. Secret sharing is a particularly interesting cryptographic technique. Its most advanced variants indeed simultaneously enforce data privacy, availability and integrity, while allowing computation on encrypted data. The aim of this paper is thus to wholly survey secret sharing schemes with respect to data security, data access and costs in the pay-as-you-go paradigm. © Springer-Verlag Berlin Heidelberg 2017 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT GBV_ILN_24 GBV_ILN_30 GBV_ILN_70 GBV_ILN_2018 GBV_ILN_4266 GBV_ILN_4277 GBV_ILN_4311 |
container_issue |
5 |
title_short |
Secret sharing for cloud data security: a survey |
url |
https://doi.org/10.1007/s00778-017-0470-9 |
remote_bool |
false |
author2 |
Darmont, Jérôme Harbi, Nouria |
author2Str |
Darmont, Jérôme Harbi, Nouria |
ppnlink |
170933059 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s00778-017-0470-9 |
up_date |
2024-07-04T04:13:01.638Z |
_version_ |
1803620326193496064 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2051361320</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230502152015.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2017 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s00778-017-0470-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2051361320</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s00778-017-0470-9-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Attasena, Varunya</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(orcid)0000-0002-3652-9032</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secret sharing for cloud data security: a survey</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2017</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer-Verlag Berlin Heidelberg 2017</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud technologies. Various approaches, i.e., data encryption, anonymization, replication and verification, help enforce different facets of data security. Secret sharing is a particularly interesting cryptographic technique. Its most advanced variants indeed simultaneously enforce data privacy, availability and integrity, while allowing computation on encrypted data. The aim of this paper is thus to wholly survey secret sharing schemes with respect to data security, data access and costs in the pay-as-you-go paradigm.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Secret sharing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data availability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data integrity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data access</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Darmont, Jérôme</subfield><subfield code="0">(orcid)0000-0003-1491-384X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Harbi, Nouria</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">The VLDB journal</subfield><subfield code="d">Springer Berlin Heidelberg, 1992</subfield><subfield code="g">26(2017), 5 vom: 29. Juni, Seite 657-681</subfield><subfield code="w">(DE-627)170933059</subfield><subfield code="w">(DE-600)1129061-4</subfield><subfield code="w">(DE-576)032856466</subfield><subfield code="x">1066-8888</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:26</subfield><subfield code="g">year:2017</subfield><subfield code="g">number:5</subfield><subfield code="g">day:29</subfield><subfield code="g">month:06</subfield><subfield code="g">pages:657-681</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s00778-017-0470-9</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_30</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4266</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4277</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4311</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">26</subfield><subfield code="j">2017</subfield><subfield code="e">5</subfield><subfield code="b">29</subfield><subfield code="c">06</subfield><subfield code="h">657-681</subfield></datafield></record></collection>
|
score |
7.4007463 |