ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Shamir's Secret Sharing Algorithm Implemented in SQL

Journal: INTERNATIONAL JOURNAL OF DATA & NETWORK SECURITY (Vol.2, No. 1)

Publication Date:

Authors : ;

Page : 112-117

Keywords : Database Security; Shamir's secret sharing; invers mod function; SQL;

Source : Download Find it from : Google Scholarexternal

Abstract

In this paper, we propose a solution for the problem of secret sharing along different databases that may be used in hybrid cloud data security. In a hybrid cloud data may be spitted over more clouds and may be stored by service providers, so one important issue is the security of sensitive data. Secret sharing is not a new challenge in the IT world; there are many old and good algorithms that may be used. The contribution of this paper is to implement such an algorithm (Shamir's secret sharing algorithm) in SQL, 100% declarative and to describe the architecture that ensures secret sharing and secret recovery in a transparent manner. The challenge is to solve problems from finite field arithmetic with operators from relational algebra. By using this architecture the developers would concentrate only at the business design, being ensured that secrets spread over clouds remain secrets even if the service providers will not play fair.

Last modified: 2016-07-02 18:14:59