Abstract
For the problem of stealing user privacy data by non-trusted cloud computing service providers, the secret-sharing technique are applied to the cloud computing environment by using the Chinese remainder theorem, elliptic curve discrete logarithm problem and bilinear transformation. As a new verifiable secret sharing scheme, the Chinese residual theorem aims to allocate the special secret share and the common secret share respectively to the user and the cloud service provider. Without the participation of the user, the cloud service provider cannot restore the user's private data. The solution can detect the honesty of the cloud service provider and detect the fraud behavior of the cloud service provider in the system. The elliptic curve and the bilinear pairing technology. Not only reduces the computational cost of the system, but also achieves the verifiability of the solution and enhances the security of the system.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.