Show simple item record

dc.contributor.authorAdeka, Muhammad I.*
dc.contributor.authorShepherd, Simon J.*
dc.contributor.authorAbd-Alhameed, Raed A.*
dc.contributor.authorAhmed, N.A.S.*
dc.date.accessioned2017-02-27T11:14:16Z
dc.date.available2017-02-27T11:14:16Z
dc.date.issued2015
dc.identifier.citationAdeka MI, Shepherd SJ, Abd-Alhameed RA et al (2015) A Versatile and Ubiquitous Secret Sharing: A cloud data repository secure access. In: Proceedings of the Conference on Internet Technologies and Applications (ITA), 8-11 Sep 2015, Glyndwr University, Wrexham, Wales, UK. 466-471.en_US
dc.identifier.urihttp://hdl.handle.net/10454/11481
dc.descriptionNoen_US
dc.description.abstractThe Versatile and Ubiquitous Secret Sharing System, a cloud data repository secure access and a web based authentication scheme. It is designed to implement the sharing, distribution and reconstruction of sensitive secret data that could compromise the functioning of an organisation, if leaked to unauthorised persons. This is carried out in a secure web environment, globally. It is a threshold secret sharing scheme, designed to extend the human trust security perimeter. The system could be adapted to serve as a cloud data repository and secure data communication scheme. A secret sharing scheme is a method by which a dealer distributes shares of a secret data to trustees, such that only authorised subsets of the trustees can reconstruct the secret. This paper gives a brief summary of the layout and functions of a 15-page secure server-based website prototype; the main focus of a PhD research effort titled ‘Cryptography and Computer Communications Security: Extending the Human Security Perimeter through a Web of Trust’. The prototype, which has been successfully tested, has globalised the distribution and reconstruction processes.en_US
dc.description.sponsorshipPetroleum Technology Development Funden_US
dc.language.isoenen_US
dc.relation.isreferencedbyhttp://dx.doi.org/10.1109/ITechA.2015.7317449en_US
dc.subjectAuthentication; Secret sharing; Cryptography; Key management; Interpolation; Authorised user; Human security perimeter; (k, n)-threshold; Participants; Trustees; Dealer; Distributor; Combiner; Cloud data repositoryen_US
dc.titleA Versatile and Ubiquitous Secret Sharing: A cloud data repository secure accessen_US
dc.status.refereedYesen_US
dc.typeConference paperen_US
dc.type.versionNo full-text in the repositoryen_US
refterms.dateFOA2018-07-26T09:50:02Z


Item file(s)

Thumbnail
Name:
adeka_et_al_2015.pdf
Size:
891.0Kb
Format:
PDF

This item appears in the following Collection(s)

Show simple item record