Identity-Based Ring Signature for Data Sharing in Cloud with Forward Security

Authors(2) :-Lokesh Pasupulati, Lakshmikanth G

Cloud computing greatly facilitates information providers who ought to supply their info to the cloud whereas not revealing their sensitive information to external parties. data sharing has ne'er been easier with the advances of cloud computing, and an correct analysis on the shared data provides an array of advantages to each the society and people. data sharing with an outsized variety of participants should take into consideration many problems, together with efficiency, data integrity and privacy of information owner. In existing system Cloud applications have completely different necessities in terms of price and quality, and different applications can co-exist within the same cloud infrastructure that have different tradeoffs between these.it permits completely different applications to implement their own tradeoffs transparently by abstracting away the task of allocating resources between applications with differing necessities to an auction mechanism.in existing system,If a secret key of any user has been compromised then the we have a tendency to loose all the information that we ar sharing for this reason we tends to projected model. Ring signature could be a promising candidate to construct an anonymous and authentic data sharing system. It permits Data owner to anonymously certify his data which may be place into the cloud for storage or analysis purpose. nonetheless the expensive certificate verification within the ancient public key infrastructure (PKI) setting becomes a bottleneck for this resolution to be scalable. Identity-based (ID-based) ring signature, that eliminates the method of certificate verification. we any enhance the safety of ID-based ring signature by providing forward security: If a secret key of any user has been compromised, all previous generated signatures that embody this user still stay valid. This property is very vital to any giant scale data sharing system, because it is not possible to raise all data owners to reauthenticate their data even if a secret key of 1 single user has been compromised. we offer a concrete and economical instantiation of our theme, prove its security and supply an implementation to indicate its utility.

Authors and Affiliations

Lokesh Pasupulati
M.Tech, C.S.E, Sreerama Engineering College, Tirupati, Aandhra Pradesh, India
Lakshmikanth G
Assisstant Professor, Department of CSE, Sreerama Engineering College, Tirupati, Andhra Pradesh, India

Authentication, data sharing, cloud computing, forward security, smart grid.

  1. J.-M. Bohli, N. Gruschka, M. Jensen, L. L. Iacono, and N. Marnau. Security and privacy-enhancing multicloud architectures. IEEE Trans. Dependable Sec. Comput., 10(4):212-224, 2013.
  2. M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst., 24(1):131-143, 2013.
  3. X. Liu, Y. Zhang, B. Wang, and J. Yan. Mona: Secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst., 24(6):1182-1191, 2013.
  4. K. Chard, K. Bubendorfer, S. Caton, and O. F. Rana. Social cloud computing: A vision for socially motivated resource sharing. IEEE T. Services Computing, 5(4):551-563, 2012.
  5. S. Sundareswaran, A. C. Squicciarini, and D. Lin. Ensuring distributed accountability for data sharing in the cloud. IEEE Trans. Dependable Sec. Comput., 9(4):556-568, 2012.
  6. M. Abe, M. Ohkubo, and K. Suzuki. 1-out-of-n Signatures from a Variety of Keys. In ASIACRYPT 2002, volume 2501 of Lecture Notes in Computer Science, pages 415-432. Springer, 2002.
  7. R. Anderson. Two remarks on public-key cryptology. Manuscript, Sep. 2000. Relevant material presented by the author in an invited lecture at the Fourth ACM Conference on Computer and Communications Security, 1997. 8G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 255-270. Springer, 2000.
  8. M. H. Au, J. K. Liu, T. H. Yuen, and D. S. Wong. Id-based ring signature scheme secure in the standard model. In IWSEC, volume 4266 of Lecture Notes in Computer Science, pages 1-16. Springer, 2006.
  9. A. K. Awasthi and S. Lal. Id-based ring signature and proxy ring signature schemes from bilinear pairings. CoRR, abs/cs/0504097, 2005.
  10. M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: formal definitions, simplified requirements and a construction based on general assumptions. In EUROCRYPT’03, volume 2656 of Lecture Notes in Computer Science. Springer, 2003.
  11. M. Bellare and S. Miner. A forward-secure digital signature scheme. In Crypto’99, volume 1666 of Lecture Notes in Computer Science, pages 431-448. Springer-Verlag, 1999.
  12. A. Boldyreva. Efficient Threshold Signature, Multisignature and Blind Signature Schemes Based on the Gap Diffie-Hellman Group Signature Scheme. In PKC’03, volume 567 of Lecture Notes in Computer Science, pages 31-46. Springer, 2003.
  13. D. Boneh, X. Boyen, and H. Shacham. Short Group Signatures. In CRYPTO 2004, volume 3152 of Lecture Notes in Computer Science, pages 41-55. Springer, 2004.
  14. E. Bresson, J. Stern, and M. Szydlo. Threshold ring signatures and applications to ad-hoc groups. In M. Yung, editor, CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 465-480. Springer, 2002.
  15. L. Chen, C. Kudla, and K. G. Paterson. Concurrent signatures. In EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, pages 287-305. Springer, 2004.
  16. H.-Y. Chien. Highly efficient id-based ring signature from pairings. In APSCC, pages 829-834, 2008.
  17. S. S. Chow, R. W. Lui, L. C. Hui, and S. Yiu. Identity Based Ring Signature: Why, How and What Next. In D. Chadwick and G. Zhao, editors, EuroPKI, volume 3545 of Lecture Notes in Computer Science, pages 144-161. Springer, 2005.
  18. S. S. M. Chow, V. K.-W. Wei, J. K. Liu, and T. H. Yuen. Ring signatures without random oracles. In ASIACCS, pages 297-302. ACM, 2006. 20S. S. M. Chow, S.-M. Yiu, and L. C. K. Hui. Efficient identity based ring signature. In ACNS 2005, volume 3531 of Lecture Notes in Computer Science, pages 499-512. Springer, 2005.

Publication Details

Published in : Volume 4 | Issue 8 | May-June 2018
Date of Publication : 2018-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 288-292
Manuscript Number : IJSRSET184895
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Lokesh Pasupulati, Lakshmikanth G, " Identity-Based Ring Signature for Data Sharing in Cloud with Forward Security, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 8, pp.288-292, May-June-2018.
Journal URL : http://ijsrset.com/IJSRSET184895

Article Preview

Follow Us

Contact Us