Secret Sharing Approach in Multi-database System

Authors

  • Shipra PraveenKumar Choudhary B.E Student, Computer Engineering Department, SAKEC, Chembur, Mumbai
  • Apeksha Katarni B.E Student, Computer Engineering Department, SAKEC, Chembur, Mumbai
  • Shweta Manjrekar B.E Student, Computer Engineering Department, SAKEC, Chembur, Mumbai
  • Mrs. Vidyullata Devmane Assistant Professor, Computer Engineering Department, SAKEC, Chembur, Mumbai
  • Mrs. Vaishali Hirlekar Assistant Professor, Computer Engineering Department, SAKEC, Chembur, Mumbai

DOI:

https://doi.org/10.24297/ijct.v15i6.1606

Keywords:

Security goals, symmetric key cryptosystem, Shamir’s Secret sharing scheme, threshold, Lagrange polynomial interpolation, One Time Password .

Abstract

Secret sharing schemes are ideal for storing highly sensitive data. A secret is divided into many parts and every participant gets his unique part. If we combine all of these parts and try regenerating the secret then it might be impractical, and therefore the threshold scheme is used. Shamir’s secret sharing scheme supports the same. Here, some of the parts or all of them are required to reconstruct the secret. Any threshold number of parts are sufficient to reconstruct the original secret. The Admin has a set of files which are confidentiality and availability of data. Whenever a Client requests to access the files, the Admin performs authentication of the user through an encrypted and stored on multiple databases so as to achieve Authentication module, who makes use if Shamir's secret sharing concept. This is similar to the One Time Password (OTP) mechanism. If the Client is authentic, Admin grants him the decryption key and the Client can access the file. In this paper, we shall discuss all this in detail using which we can provide security, replication of data and authentication. 

Downloads

Download data is not yet available.

Downloads

Published

2016-04-20

How to Cite

Choudhary, S. P., Katarni, A., Manjrekar, S., Devmane, M. V., & Hirlekar, M. V. (2016). Secret Sharing Approach in Multi-database System. INTERNATIONAL JOURNAL OF COMPUTERS &Amp; TECHNOLOGY, 15(6), 6819–6823. https://doi.org/10.24297/ijct.v15i6.1606

Issue

Section

Research Articles