Manuscript Number : IJSRSET184895
Identity-Based Ring Signature for Data Sharing in Cloud with Forward Security
Authors(2) :-Lokesh Pasupulati, Lakshmikanth G
Cloud computing greatly facilitates information providers who ought to supply their info to the cloud whereas not revealing their sensitive information to external parties. data sharing has ne'er been easier with the advances of cloud computing, and an correct analysis on the shared data provides an array of advantages to each the society and people. data sharing with an outsized variety of participants should take into consideration many problems, together with efficiency, data integrity and privacy of information owner. In existing system Cloud applications have completely different necessities in terms of price and quality, and different applications can co-exist within the same cloud infrastructure that have different tradeoffs between these.it permits completely different applications to implement their own tradeoffs transparently by abstracting away the task of allocating resources between applications with differing necessities to an auction mechanism.in existing system,If a secret key of any user has been compromised then the we have a tendency to loose all the information that we ar sharing for this reason we tends to projected model. Ring signature could be a promising candidate to construct an anonymous and authentic data sharing system. It permits Data owner to anonymously certify his data which may be place into the cloud for storage or analysis purpose. nonetheless the expensive certificate verification within the ancient public key infrastructure (PKI) setting becomes a bottleneck for this resolution to be scalable. Identity-based (ID-based) ring signature, that eliminates the method of certificate verification. we any enhance the safety of ID-based ring signature by providing forward security: If a secret key of any user has been compromised, all previous generated signatures that embody this user still stay valid. This property is very vital to any giant scale data sharing system, because it is not possible to raise all data owners to reauthenticate their data even if a secret key of 1 single user has been compromised. we offer a concrete and economical instantiation of our theme, prove its security and supply an implementation to indicate its utility.
Lokesh Pasupulati
Authentication, data sharing, cloud computing, forward security, smart grid.
Publication Details
Published in :
Volume 4 | Issue 8 | May-June 2018 Article Preview
M.Tech, C.S.E, Sreerama Engineering College, Tirupati, Aandhra Pradesh, India
Lakshmikanth G
Assisstant Professor, Department of CSE, Sreerama Engineering College, Tirupati, Andhra Pradesh, India
Date of Publication :
2018-06-30
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) :
288-292
Manuscript Number :
IJSRSET184895
Publisher : Technoscience Academy
Journal URL :
http://ijsrset.com/IJSRSET184895