CFP last date
20 December 2024
Reseach Article

Review on Forward Secure Identity based Ring Signature for Data Sharing in the Cloud

by Priti Rumao, Sumedh Pundkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 142 - Number 8
Year of Publication: 2016
Authors: Priti Rumao, Sumedh Pundkar
10.5120/ijca2016909894

Priti Rumao, Sumedh Pundkar . Review on Forward Secure Identity based Ring Signature for Data Sharing in the Cloud. International Journal of Computer Applications. 142, 8 ( May 2016), 40-42. DOI=10.5120/ijca2016909894

@article{ 10.5120/ijca2016909894,
author = { Priti Rumao, Sumedh Pundkar },
title = { Review on Forward Secure Identity based Ring Signature for Data Sharing in the Cloud },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 142 },
number = { 8 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 40-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume142/number8/24920-2016909894/ },
doi = { 10.5120/ijca2016909894 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:44:30.066261+05:30
%A Priti Rumao
%A Sumedh Pundkar
%T Review on Forward Secure Identity based Ring Signature for Data Sharing in the Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 142
%N 8
%P 40-42
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The key feature of cloud computing is one can access information any place, anywhere, at any time. So basically cloud computing is subscription based service where one can obtain network storage space and computer resources for data storage as well as data sharing. Due to high fame of cloud for data storage and sharing, large number of participants gets attracted to it but it leads to issue related to efficiency, Data integrity, privacy and authentication. To overcome these issues, concept of ring signature has been introduced for data sharing amongst large number of users. Ring signatures are used to provide user’s anonymity and signer’s privacy. Use of ID-based ring signature, removes the need of certificate verification which was done using public key infrastructure, hence reduce cost as well as introduction of forward security, further strengthen this system more. Use of weil pairing, keeps even shorter keys secure and it also requires less processing power. So the motivation of this paper is to propose a secure data reading and sharing scheme using above mentioned scheme.

References
  1. Huang, Joseph K. Liu+, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou “Cost-effective authentic and anonymous data sharing with forward security”.DOI:10.1109/TC.2014.2315619,IEEE Transactions on Computers.
  2. Javier Herranz IIIA, “Identity-Based Ring Signatures From RSA ” Artificial Intelligence Research Institute, CSIC, Spanish National Research Council, Campus UAB s/n, E-08193 Bellaterra, Spain
  3. P. P. Tsang, M. H. Au, J. K. Liu, W. Susilo, and D. S. Wong, “A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract),” in Proc. 4th Int. Conf. Provable Security, 2010, vol. 6402, pp. 166–183.
  4. Mihir Bellare and Sara K. Miner” A Forward-Secure Digital Signature Scheme” Dept. of Computer Science, &Engineering University of California at San Diego, 9500 Gilman Drive La Jolla, CA 92093, USA.
  5. Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, “Security And Privacy-Enhancing Multi cloud Architectures” Member, IEEE, Luigi Lo Iacono.
  6. Adi Shamir, R. Rivest and Y. Tauman, “How to leak secret”, In Asiacrypt'01 LNCS 2248 (2001), 552-565.
  7. Aftuck, Alex Edward, "The Weil Pairing on Elliptic Curves and Its Cryptographic Applications" (2011). UNF Theses and Dissertations. Paper 139. http://digitalcommons.unf.edu/etd/139
Index Terms

Computer Science
Information Sciences

Keywords

Authentication data sharing ring signature forward security cloud computing.