International Conference on Internet of Things, Next Generation Networks and Cloud Computing |
Foundation of Computer Science USA |
ICINC2016 - Number 3 |
July 2016 |
Authors: Vidya A. Gaikwad, Sachin D. Babar |
ecef028b-1754-4421-9e4e-4286fbd042b3 |
Vidya A. Gaikwad, Sachin D. Babar . Survey on Forward Security for Authentic and Anonymous Data Sharing with Auditing Integrity. International Conference on Internet of Things, Next Generation Networks and Cloud Computing. ICINC2016, 3 (July 2016), 1-5.
Large amount of data sharing has never been less demanding to the advances of cloud computing, and a precise examination on the shared data gives a variety of advantages to both the society and individuals. Data sharing to an expansive number of members must consider a few issues, including effectiveness, data integrity and protection of data owner. Ring signature is a promising contender to develop a mysterious and authentic data sharing system. It allows a data owner to anonymously confirm his information which can be put into the cloud for storage or analysis reason. Yet the excessive testament check in the conventional public key infrastructure (PKI) setting turns into a bottleneck for this answer still adaptable. Identity-based (ID-based) ring signature, which takes out the procedure of certificate verification, can be utilized. In this paper, the upgraded concept of the secure ID-based signature provides so as to have a ring signature forward security: If a secret key of any user has been bargained, all past created signatures that incorporate these users still remain legitimate. This property is particularly critical to any huge scale data sharing system, as it is difficult to ask all data owner to re-authenticate their data regardless of the possibility that a secret key of one single user has been traded off. A strong and effective instantiation of the plan, exhibit its security and give an execution to show its sound judgment.