as follows:
H
S
′
| S
1
, S
2
, . . . , S
k
≤ H
S
′
(7)
The fault arises when overlapping shares exist in
rearranged secret S
′
. This constrains the fault range of
S
′
, preventing oppressive opponents from breaching
absolute secrecy. Mathematical proof shows oppos-
ing adversaries lack meaningful info about the secret,
requiring access to shares.
8 CONCLUSION AND FUTURE
AVENUES
We presented a decentralized ransomware recovery
networks utilize mesh networks and secret sharing
schemes for heightened security and robustness. By
employing layers of security and distributed key man-
agement techniques, our solution effectively safe-
guards sensitive data against ransomware attacks and
malicious sharing. Through rigorous mathematical
modeling and analytics, we have demonstrated its ef-
fectiveness against cyberattacks. In ransomware sce-
narios, our approach ensures data recovery by decen-
tralizing trust and distributing encryption keys among
network nodes.
DRRN future avenues involves enhancing pri-
vacy with ICRC technologies, integrating ML and
human brain algorithms for ransomware detection,
partnering with industries for deployment and assess-
ment. Long-term studies on ransomware risk, adapt-
ing DRRN, and legal tasks are included.
ACKNOWLEDGEMENTS
This work was supported in part by the Na-
tional Key R&D Program of China under Grant
2020YFA0908700, the National Nature Science
Foundation of China under Grants 62073225,
62203134, 61972263, 62072315, the Natural Science
Foundation of Guangdong Province-Outstanding
Youth Program under Grant 2019B151502018,
the Natural Science Foundation of Guangdong
Province under Grant 2021A1515011153, the
Guangdong Pearl River Talent Recruitment Pro-
gram under Grant 2019ZT08X603, the Guang-
dong ”Pearl River Talent Plan” under Grant
2019JC01X235, the Shenzhen Science and
Technology Innovation Commission under Grant
20200805142159001, JCYJ20220531103401003,
JCYJ20210324093808021.
REFERENCES
Ali, S., Wang, J., and Leung, V. C. M. (2023). De-
fensive strategies against pcc attacks based on ideal
(t, n)-secret sharing scheme. Journal of King
Saud University-Computer and Information Sciences,
35(9):101784.
Amoah, C. and Steyn, D. (2023). Barriers to unethical and
corrupt practices avoidance in the construction indus-
try. International Journal of Building Pathology and
Adaptation, 41(6):85–101.
Bajpai, P. and Enbody, R. (2023). Know thy ransomware
response: A detailed framework for devising effective
ransomware response strategies. Digital Threats: Re-
search and Practice.
Chen, P.-H., Bodak, R., and Gandhi, N. S. (2021). Ran-
somware recovery and imaging operations: lessons
learned and planning considerations. Journal of Digi-
tal Imaging, 34(3):731–740.
Duong, A. T. B., Hoang, T.-H., Nguyen, T. T. B., Akbari,
M., Hoang, T. G., and Truong, H. Q. (2023). Supply
chain risk assessment in disruptive times: opportuni-
ties and challenges. Journal of Enterprise Information
Management, 36(5):1372–1401.
Fadziso, T., Thaduri, U., Dekkati, S., Ballamudi, V., and
Desamsetti, H. (2023). Evolution of the cyber secu-
rity threat: an overview of the scale of cyber threat.
Digitalization & Sustainability Review, 3(1):1–12.
Humayun, M., Jhanjhi, N., Alsayat, A., and Ponnusamy, V.
(2021). Internet of things and ransomware: Evolu-
tion, mitigation and prevention. Egyptian Informatics
Journal, 22(1):105–117.
Ilca, L. F., Lucian, O. P., and Balan, T. C. (2023). Enhancing
cyber-resilience for small and medium-sized organi-
zations with prescriptive malware analysis, detection
and response. Sensors, 23(15):6757.
Kafi, M. A. and Akter, N. (2023). Securing financial infor-
mation in the digital realm: case studies in cybersecu-
rity for accounting data protection. American Journal
of Trade and Policy, 10(1):15–26.
Shamir, A. (1979). How to share a secret. Communications
of the ACM, 22(11):612–613.
Teichmann, F., Boticiu, S. R., and Sergi, B. S. (2023). The
evolution of ransomware attacks in light of recent cy-
ber threats. how can geopolitical conflicts influence
the cyber climate? International Cybersecurity Law
Review, 4(3):259–280.
Decentralized Ransomware Recovery Network: Enhancing Resilience and Security Through Secret Sharing Schemes
301