CONTROL-CURRENT ACCURATE AND SECRET TRUTHS ALLOCATION WITH ADVANCING SAFETY

K. Deepthi Sree, N. Sujata Kumari

Abstract


Due to its openness, data speaking about is continually organized within the hostile setting and uncovered to numerous challenges of security. Speaking about of understanding wasn't have you been simple while using the advancements of cloud computing, along with an exact analysis on shared data provides you with several strengths for that society. Within our work we commence a manuscript idea of forward secure Identity-based ring signature, that's necessary tool for structuring cost-effective reliable furthermore to anonymous system of understanding speaking about. The unit permits an idea of identity based ring signature plan to incorporate forward security the initial in literature to contain this selection for ring signature in identity based setting. Within our work we advance security of identity based ring signature by way of provision of forward security. The forward guaranteed Identity-based ring signature is definitely an name based setting plus this process, removal of pricey certificate verification procedure can make it reliable and suitable for analysis of massive data.

Keywords


Data Sharing; Identity-Based Ring Signature; Cost-Effective; Anonymous System; Cloud Computing; Certificate Verification; Big Data;

References


S. S. M. Chow, V.K.-W. Wei, J. K. Liu, and T. H. Yuen, “Ring signatures without random oracles,” in Proc. ACM Symp. Inform., Comput., Commun. Security, 2006, pp. 297–302.

S. S. M. Chow, S.-M. Yiu, and L. C. K. Hui, “Efficient identity based ring signature,” in Proc. 3rd Int. Conf. Appl. Cryptography Netw. Security, 2005, vol. 3531, pp. 499–512.

R. Cramer, I. Damga rd, and B. Schoenmakers, “Proofs of partial knowledge and simplified design of witness hiding protocols,” in Proc. 14th Annu. Int. Cryptol. Conf. Adv. Cryptol., 1994, vol. 839, pp. 174–187.

J. K. Liu and D. S. Wong, “Solutions to key exposure problem in ring signature,” I. J. Netw. Secur., vol. 6, no. 2, pp. 170–180, 2008.

J. K. Liu, T. H. Yuen, and J. Zhou, “Forward secure ring signature without random oracles,” in Proc. 13th Int. Conf. Inform. Commun. Security, 2011, vol. 7043, pp. 1–14.

X. Liu, Y. Zhang, B. Wang, and J. Yan, “Mona: Secure multi-owner data sharing for dynamic groups in the cloud,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1182–1191, Jun. 2013.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.