CFP last date
20 December 2024
Reseach Article

Optimal Data Sharing with Forward Security

by Deepika V. Shinde, B. M. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 152 - Number 7
Year of Publication: 2016
Authors: Deepika V. Shinde, B. M. Patil
10.5120/ijca2016911892

Deepika V. Shinde, B. M. Patil . Optimal Data Sharing with Forward Security. International Journal of Computer Applications. 152, 7 ( Oct 2016), 10-13. DOI=10.5120/ijca2016911892

@article{ 10.5120/ijca2016911892,
author = { Deepika V. Shinde, B. M. Patil },
title = { Optimal Data Sharing with Forward Security },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2016 },
volume = { 152 },
number = { 7 },
month = { Oct },
year = { 2016 },
issn = { 0975-8887 },
pages = { 10-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume152/number7/26330-2016911892/ },
doi = { 10.5120/ijca2016911892 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:57:32.070788+05:30
%A Deepika V. Shinde
%A B. M. Patil
%T Optimal Data Sharing with Forward Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 152
%N 7
%P 10-13
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is one of the best platform which provides huge data storage and data sharing all over the time and also easily available to the users. Data sharing in the cloud contains the several issues such as data integrity, authenticity, anonymity and privacy of data owner. Identity based (ID-based) ring signature gives anonymous and authentic data sharing system, by using this there is no need of costly certificate verification in the traditional public key infrastructure (PKI).This work, enhances the security of ID-based ring signature with forward security. Using forward security, if private key of the signer is compromised then all the previously generated signatures of that signer remains valid.Using forward security, one of the user may revoke access of file to the other members of the group.

References
  1. R. Anderson. Two remarks on public-key cryptology. Manuscript, Sep. 2000. Relevant material presented by the author in an invited lecture at the Fourth ACM Conference on Computer and Communications Security, 1997.
  2. M. Klonowski, L. Krzywiecki, M. Kutylowski, and A. Lauks. Stepoutring signatures. In MFCS, volume 5162 of Lecture Notes inComputer Science, pages 431–442. Springer, 2008.
  3. M. Bellare and S. Miner. A forward-secure digital signaturescheme. In Crypto’99, volume 1666 of Lecture Notes in ComputerScience, pages 431–448. Springer-Verlag, 1999.
  4. M. H. Au, J. K. Liu, T. H. Yuen, and D. S. Wong. Id-basedring signature scheme secure in the standard model. In IWSEC, volume 4266 of Lecture Notes in Computer Science, pages 1–16. Springer, 2006.
  5. F. Zhang and K. Kim. ID-Based Blind Signature and RingSignature from Pairings. In ASIACRYPT 2002, volume 2501 ofLecture Notes in Computer Science, pages 533–547. Springer, 2002.
  6. A. L. Ferrara, M. Green, S. Hohenberger, and M. Ø. Pedersen.Practical short signature batch verification. In CT-RSA, volume5473 of Lecture Notes in Computer Science, pages 309–324. Springer,2009. Full version appeared in http://eprint.iacr.org/2008/015.
  7. J. Yu, R. Hao, F. Kong, X. Cheng, J. Fan, and Y. Chen. Forwardsecureidentity-based signature: Security notions and construction.Inf. Sci., 181(3):648–660, 2011.
  8. J. Yu, F. Kong, H. Zhao, X. Cheng, R. Hao, and X.-F. Guo. Noninteractiveforward-secure threshold signature without randomoracles. J. Inf. Sci. Eng., 28(3):571–586, 2012.
  9. J. Han, Q. Xu, and G. Chen. Efficient id-based threshold ringsignature scheme. In EUC (2), pages 437–442. IEEE ComputerSociety, 2008.
  10. M. H. Au, J. K. Liu, T. H. Yuen, and D. S. Wong. Id-basedring signature scheme secure in the standard model. In IWSEC,volume 4266 of Lecture Notes in Computer Science, pages 1–16.Springer, 2006.
  11. J. K. Liu, T. H. Yuen, and J. Zhou. Forward secure ring signature without random oracles. In ICICS, volume 7043 of Lecture Notes in Computer Science, pages 1–14. Springer, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing data sharing data integrity data authenticity ring signature anonymity forward security.