Dividing secrets to secure data outsourcing

   Abstract