Abstract

In many organizations, transformation of information and storage of sensitive data has highest priority. Client data should be kept secret as well as inaccessible from all other unauthorized hacks . To maintain the security of the user data, cloud computing environment has practiced. The cloud computing is a cost-effective, service availability, flexible and on demand service delivery platform for providing business through the internet . However, as the security of a single cloud is concerned, it fails to provide a strong protection layer against the malicious attacks. So, there is always a risk of data unavailability in system failure. A movement towards of “multi clouds” or “multiple clouds‟ or “cloud-of-clouds” has emerged currently using Shamir’s Secret Sharing Algorithm . Here, the implementation of Shamir’s secret sharing algorithm is performed to authenticate a unique user and to access a particular file from the cloud storage. General Terms Security, Cloud Computing.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call