SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 845
Using Downtoken Secure Group Data Sharing On Cloud
Mayuri Shinde1, Nirmala Sawant2, Jyoti Rakshe3, Aishwarya Manjare4
1,2,3,4Student, Dept. Of Computer Engineering, PKTC PUNE, Maharashtra, India
----------------------------------------------------------------------***--------------------------------------------------------------------
Abstract:- Nowadays Biggest Problem is that sharing the data over a public cloud storage is Privacy. An important function is
data sharing in public cloud storage. The problem solution for secure data transfer on the cloud is to encrypt the data before
sharing and using decryption keys decrypting it by the receiver. The key challenge is that to designing such an encryption
scheme lies in the efficient management of encryption keys. To avoiding this practical problem, we propose the concept of Key
Aggregate Search Encryption (KASE) in which data owner only need to distribute a single trapdoor to a group of users for
sharing many of documents and the user only needs to give a trapdoor to the cloud for querying and searching the shared
many of documents.
Key Words: Group data sharing, an, traceability, key agreement, Symmetric Balanced Incomplete Block Design
(SBIBD).
1. INTRODUCTION
Group data sharing on the cloud is a very big trend in today’s world. For security concern use of cryptographic schemes like
encryption and decryption. The problem in that when we want to share a group of files with selected users from a group
then we need different encryption keys for different files hence we need to the large database for storing this secure keys
and it becomes very complex so in our system use a KASE (Key Aggregate Search Encryption).
In KASE sender share single DT (Download Token) with the number of receivers.DT has receiver’s id and a group of files
which receiver want. And receivers only need to upload DT on the cloud. Then cloud checks the DT and some public data
for file search and sends the result to the receivers.Using DT we can send the group of documents to selected users of a
group.
2. EXISTING SYSTEM
Primary User wants to upload a large collection of files to the cloud storage, which is meant every user from group to get
access to this files.
Suppose those files contain highly sensitive information that should only be accessed by authorized users, and Secondary
User is one of the directors and is thus authorized to view documents. Due to concerns about potential Data leakage in the
cloud, Primary User encrypts these documents with different keys and generates keyword cipher texts before uploading to
the cloud storage. Primary User then uploads and shares those files with the directors using the sharing functionality of the
cloud storage.
In order for Secondary User to view the files, need different decryption keys for different files.When files are sufficiently
large, the key distribution and storage, as well as the trapdoor generation, may become too expensive for the client-side
device, which basically defies the purpose of using cloud storage.
3. PROBLEM STATEMENT
In our system, User Upload Encrypted Files on Cloud Server with a generated Download Token to share the files securely
from one user to another. When user share file to another user then a generate Download token and send to another user
for the File Downloading. Download token also uses for search files on the cloud.
4. PROPOSED SYSTEM
In this section, we present our scheme in detail. Benefiting from the KASE the presented scheme the presented scheme can
be applied for group data sharing with low communication and computation complexities. Our scheme can be divided into
five parts: initialization, key generation, fault detection, file generation and key update, file access and traceability.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 846
5. ARCHITECTURE
Fig -1: System Architecture
In Fig 1. Primary user uploads encrypted files on cloud server with a generated Download Token to share the files securely
from one user to another number of secondary users.The primary user generates Download token and sends to the
secondary user. The secondary user uploads download token on the cloud. At cloud verify DT and according to that sends
to the secondary user for the File Downloading.
6. FLOW DIAGRAM
Fig -2: Flow Diagram
7. ADVANTAGES
Confidentiality: The confidentiality of the outsourced Data Is Preserved.
Dynamic changes: Arbitrary number of users and dynamic changes are supported.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 847
Low energy: consumption and resource sharing.
Efficient: Client authorizes access to his/her data for many clients with secure and efficient at the same time.
8. FUTURE SCOPE
In cloud storage, the number of ciphertexts usually grows rapidly. So we have to reserve enough cipher text classes for the
future extension. Otherwise, we need to expand the public-key. Although the parameter can be downloaded with cipher
texts. In future we can add this concept on Android application hence it will be more efficient as compared to proposed
system.
9. CONCLUSION
We present a secure and fault-tolerant key agreement for group data sharing in a cloud storage scheme. Our scheme can
support the traceability of user identity in an anonymous environment. In terms of dynamic changes of the group member,
taking advantage of the key agreement and efficient access control, the computational complexity and communication
complexity for updating the common conference key and the encrypted data are relatively low.
REFERENCES
[1] Zhou, V. Varadharajan, and M. Hitchens, Cryptographic role-based access control for secure cloud data storage
systems, Information Forensics and Security IEEE Transactions on, vol. 10, no.11, pp. 23812395, 2015.
[2] Manghui Tu, Peng Li, Ling Yen, Bhavani the raising- ham, and Latifur Khan. Data objects replication in the data grid.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 5(4), 2008.
[3] William Stallings.Cryptography and Network Security: Principles and Practices, 4th edition. Pearson Education, Inc.,
2006.
[4] S. A. Weil, S. A. Brandt, E. L. Miller, and C. Maltzahn. Crush Con-trolled, scalable, decentralized placement of replicated
data. In Proc. of ACM/IEEE Con. on Supercomputing, 2006.
[6] E. Dawson and D. Donovan.The breadth of Shamir as secret-sharing scheme.Computers and Security, 13:69 78, 1994.
[7] S. Lakshmanan, M. Ahamad, and H. Venkateswaran. Responsive security for stored data.IEEE Transactions on Parallel
and Distributed Systems, 14(9), 2003.
[8] T. Rabin and M. Ben-Or.Veri able secret sharing and multiparty protocols with honest majority (extended abstract)
Communication of The ACM, 1989.
[5] C. Asmuth and J. Bloom. A modular approach to key safeguarding.IEEE Transactions on Information Theory,
29:208210, 1983.

More Related Content

PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
PPTX
Secure data sharing for dynamic groups in multi-owner using cloud
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
PDF
J018145862
PDF
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
PDF
Oruta project report
DOC
Oruta privacy preserving public auditing
PDF
Encryption based multi user manner secured data sharing and storing in cloud
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
Secure data sharing for dynamic groups in multi-owner using cloud
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
J018145862
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
Oruta project report
Oruta privacy preserving public auditing
Encryption based multi user manner secured data sharing and storing in cloud

What's hot (19)

PPTX
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
PPTX
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
PPTX
Oruta ppt
PDF
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
PDF
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
PPT
Secure Data Sharing in Cloud (SDSC)
PDF
Providing Secure Cloud for College Campus
PDF
Mona secure multi owner data sharing for dynamic groups in the cloud
PDF
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
PDF
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
PPT
PDF
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
PDF
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
PPT
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
PDF
Iaetsd secure data sharing of multi-owner groups in cloud
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
PDF
IRJET- Securing Cloud Data Under Key Exposure
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
Oruta ppt
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Secure Data Sharing in Cloud (SDSC)
Providing Secure Cloud for College Campus
Mona secure multi owner data sharing for dynamic groups in the cloud
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Secure data sharing in cloud computing using revocable storage identity-based...
Iaetsd secure data sharing of multi-owner groups in cloud
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
IRJET- Securing Cloud Data Under Key Exposure
Ad

Similar to IRJET-Using Downtoken Secure Group Data Sharing on Cloud (20)

PDF
Anonymous Key Based Secure File Encryption in Cloud
PDF
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
PDF
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
PDF
Secure Data Sharing In an Untrusted Cloud
PDF
A cloud storage system for sharing data securely with privacy preservation an...
PDF
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
PDF
A secure anti collusion data sharing scheme for dynamic groups in the cloud
PDF
A secure anti collusion data sharing scheme for dynamic groups in the cloud
PDF
Secured architecture for multi cloud using key aggregation technique
PDF
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
PDF
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
PDF
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
DOCX
Smart Security For Data Sharing In Cloud Computing
DOCX
Smart Security For Data Sharing In Cloud Computing
PDF
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
PDF
Volume 2-issue-6-2073-2076
PDF
Volume 2-issue-6-2073-2076
PDF
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
PDF
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
PDF
IJSRED-V2I3P52
Anonymous Key Based Secure File Encryption in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
Secure Data Sharing In an Untrusted Cloud
A cloud storage system for sharing data securely with privacy preservation an...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Secured architecture for multi cloud using key aggregation technique
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud Computing
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
Volume 2-issue-6-2073-2076
Volume 2-issue-6-2073-2076
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
IJSRED-V2I3P52
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
Geodesy 1.pptx...............................................
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
web development for engineering and engineering
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Sustainable Sites - Green Building Construction
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Lecture Notes Electrical Wiring System Components
PPT
Mechanical Engineering MATERIALS Selection
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Well-logging-methods_new................
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Geodesy 1.pptx...............................................
Embodied AI: Ushering in the Next Era of Intelligent Systems
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
CH1 Production IntroductoryConcepts.pptx
Internet of Things (IOT) - A guide to understanding
web development for engineering and engineering
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
OOP with Java - Java Introduction (Basics)
Sustainable Sites - Green Building Construction
UNIT 4 Total Quality Management .pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Lecture Notes Electrical Wiring System Components
Mechanical Engineering MATERIALS Selection
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Well-logging-methods_new................
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks

IRJET-Using Downtoken Secure Group Data Sharing on Cloud

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 845 Using Downtoken Secure Group Data Sharing On Cloud Mayuri Shinde1, Nirmala Sawant2, Jyoti Rakshe3, Aishwarya Manjare4 1,2,3,4Student, Dept. Of Computer Engineering, PKTC PUNE, Maharashtra, India ----------------------------------------------------------------------***-------------------------------------------------------------------- Abstract:- Nowadays Biggest Problem is that sharing the data over a public cloud storage is Privacy. An important function is data sharing in public cloud storage. The problem solution for secure data transfer on the cloud is to encrypt the data before sharing and using decryption keys decrypting it by the receiver. The key challenge is that to designing such an encryption scheme lies in the efficient management of encryption keys. To avoiding this practical problem, we propose the concept of Key Aggregate Search Encryption (KASE) in which data owner only need to distribute a single trapdoor to a group of users for sharing many of documents and the user only needs to give a trapdoor to the cloud for querying and searching the shared many of documents. Key Words: Group data sharing, an, traceability, key agreement, Symmetric Balanced Incomplete Block Design (SBIBD). 1. INTRODUCTION Group data sharing on the cloud is a very big trend in today’s world. For security concern use of cryptographic schemes like encryption and decryption. The problem in that when we want to share a group of files with selected users from a group then we need different encryption keys for different files hence we need to the large database for storing this secure keys and it becomes very complex so in our system use a KASE (Key Aggregate Search Encryption). In KASE sender share single DT (Download Token) with the number of receivers.DT has receiver’s id and a group of files which receiver want. And receivers only need to upload DT on the cloud. Then cloud checks the DT and some public data for file search and sends the result to the receivers.Using DT we can send the group of documents to selected users of a group. 2. EXISTING SYSTEM Primary User wants to upload a large collection of files to the cloud storage, which is meant every user from group to get access to this files. Suppose those files contain highly sensitive information that should only be accessed by authorized users, and Secondary User is one of the directors and is thus authorized to view documents. Due to concerns about potential Data leakage in the cloud, Primary User encrypts these documents with different keys and generates keyword cipher texts before uploading to the cloud storage. Primary User then uploads and shares those files with the directors using the sharing functionality of the cloud storage. In order for Secondary User to view the files, need different decryption keys for different files.When files are sufficiently large, the key distribution and storage, as well as the trapdoor generation, may become too expensive for the client-side device, which basically defies the purpose of using cloud storage. 3. PROBLEM STATEMENT In our system, User Upload Encrypted Files on Cloud Server with a generated Download Token to share the files securely from one user to another. When user share file to another user then a generate Download token and send to another user for the File Downloading. Download token also uses for search files on the cloud. 4. PROPOSED SYSTEM In this section, we present our scheme in detail. Benefiting from the KASE the presented scheme the presented scheme can be applied for group data sharing with low communication and computation complexities. Our scheme can be divided into five parts: initialization, key generation, fault detection, file generation and key update, file access and traceability.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 846 5. ARCHITECTURE Fig -1: System Architecture In Fig 1. Primary user uploads encrypted files on cloud server with a generated Download Token to share the files securely from one user to another number of secondary users.The primary user generates Download token and sends to the secondary user. The secondary user uploads download token on the cloud. At cloud verify DT and according to that sends to the secondary user for the File Downloading. 6. FLOW DIAGRAM Fig -2: Flow Diagram 7. ADVANTAGES Confidentiality: The confidentiality of the outsourced Data Is Preserved. Dynamic changes: Arbitrary number of users and dynamic changes are supported.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 847 Low energy: consumption and resource sharing. Efficient: Client authorizes access to his/her data for many clients with secure and efficient at the same time. 8. FUTURE SCOPE In cloud storage, the number of ciphertexts usually grows rapidly. So we have to reserve enough cipher text classes for the future extension. Otherwise, we need to expand the public-key. Although the parameter can be downloaded with cipher texts. In future we can add this concept on Android application hence it will be more efficient as compared to proposed system. 9. CONCLUSION We present a secure and fault-tolerant key agreement for group data sharing in a cloud storage scheme. Our scheme can support the traceability of user identity in an anonymous environment. In terms of dynamic changes of the group member, taking advantage of the key agreement and efficient access control, the computational complexity and communication complexity for updating the common conference key and the encrypted data are relatively low. REFERENCES [1] Zhou, V. Varadharajan, and M. Hitchens, Cryptographic role-based access control for secure cloud data storage systems, Information Forensics and Security IEEE Transactions on, vol. 10, no.11, pp. 23812395, 2015. [2] Manghui Tu, Peng Li, Ling Yen, Bhavani the raising- ham, and Latifur Khan. Data objects replication in the data grid. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 5(4), 2008. [3] William Stallings.Cryptography and Network Security: Principles and Practices, 4th edition. Pearson Education, Inc., 2006. [4] S. A. Weil, S. A. Brandt, E. L. Miller, and C. Maltzahn. Crush Con-trolled, scalable, decentralized placement of replicated data. In Proc. of ACM/IEEE Con. on Supercomputing, 2006. [6] E. Dawson and D. Donovan.The breadth of Shamir as secret-sharing scheme.Computers and Security, 13:69 78, 1994. [7] S. Lakshmanan, M. Ahamad, and H. Venkateswaran. Responsive security for stored data.IEEE Transactions on Parallel and Distributed Systems, 14(9), 2003. [8] T. Rabin and M. Ben-Or.Veri able secret sharing and multiparty protocols with honest majority (extended abstract) Communication of The ACM, 1989. [5] C. Asmuth and J. Bloom. A modular approach to key safeguarding.IEEE Transactions on Information Theory, 29:208210, 1983.