Research Area:  Cloud Security
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud technologies. Various approaches, i.e., data encryption, anonymization, replication and verification, help enforce different facets of data security. Secret sharing is a particularly interesting cryptographic technique. Its most advanced variants indeed simultaneously enforce data privacy, availability and integrity, while allowing computation on encrypted data. The aim of this paper is thus to wholly survey secret sharing schemes with respect to data security, data access and costs in the pay-as-you-go paradigm.
Keywords:  
Author(s) Name:  Varunya Attasena, Jérôme Darmont & Nouria Harbi
Journal name:  The VLDB Journal
Conferrence name:  
Publisher name:  Springer
DOI:  10.1007/s00778-017-0470-9
Volume Information:  volume 26, pages 657–681 (2017)
Paper Link:   https://link.springer.com/article/10.1007/s00778-017-0470-9