A hybrid approach of secret sharing with fragmentation and encryption in cloud environment for securing outsourced medical database: a revolutionary approach

DN Le, B Seth, S Dalal - Journal of Cyber Security and …, 2018 - journals.riverpublishers.com
Cloud Computing is observed as the greatest paradigm change in Information technology.
Data outsourcing is an inventive representation with the intention of trustworthy storage and …

Threshold Key Management Scheme for Blockchain‐Based Intelligent Transportation Systems

T Zhou, J Shen, Y Ren, S Ji - Security and Communication …, 2021 - Wiley Online Library
Intelligent transportation systems (ITS) have always been an important application of Internet
of Things (IoT). Today, big data and cloud computing have further promoted the construction …

An improved security and privacy management system for data in multi-cloud environments using a hybrid approach

S Pachala, C Rupa, L Sumalatha - Evolutionary Intelligence, 2021 - Springer
Storing and accessing the information in the multi-cloud hosting environment becomes
popular these days. It offers benefits like the assurance of data protection, preventing …

Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities

J Shen, D Liu, X Sun, F Wei, Y Xiang - Future Generation Computer …, 2020 - Elsevier
With the wide usage of the information and communication technology (ICT) in smart cities,
people's lives become easier and more convenient. Cloud computing, as a burgeoning …

Efficient Group Key Management for Resilient Operation of LoRaWAN-Based Smart Grid Applications

Y Hanna, M Cebe, J Leon… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Recent developments in low-rate wide-area wireless technologies will enable the
deployment of publish–subscribe architectures that can span larger geographical areas in …

Fog-based file sharing for secure and efficient file management in personal area network with heterogeneous wearable devices

JE Park, YH Park - Journal of Communications and Networks, 2018 - ieeexplore.ieee.org
In a personal area network (PAN) with wearable devices, the security of a file stored is an
important concern. Secret sharing has received considerable attention for handling security …

Multi-party codebook distribution strategy based on secret sharing

W She, H Feng, Z Tian, X Rong, T Ma, W Liu - International Journal of …, 2024 - Springer
The paper addresses the issue of secure distribution of codebooks in the field of information
security, particularly in the domain of covert communication. We propose a codebook …

Optimized Retrieval and Secured Cloud Storage for Medical Surgery Videos Using Deep Learning.

G Megala, P Swarnalatha - International Journal of …, 2024 - search.ebscohost.com
Efficient secured storage and retrieval of medical surgical videos are essential for modern
healthcare systems. Traditional methods often struggle with scalability, accessibility, and …

SECURELY-A Golang CLI Tool for Secure File Sharing with Shamir's Secret Sharing Scheme

S Khandagale, M Naikar, S Shaikh… - … on Blockchain and …, 2023 - ieeexplore.ieee.org
This paper proposes a confidential file-sharing system based on Shamir's secret sharing
technique. Data is encrypted using the secure Shamir's Secret Sharing Scheme. After …

Enhanced Password Security through Multi-Split Encryption and Recovery

M Mehta, B Yamini - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
This paper introduces a novel approach to password management using Shamir's Secret
Sharing scheme. The methodology involves generating and distributing private key shares …