Effective Data Sharing with Forward Security Identity based Ring Signature using different algorithms

被引:0
|
作者
Pandey, Vivek [1 ]
Kulkarni, Umesh [1 ]
机构
[1] Vidyalankar Inst Technol, Comp Engn, Mumbai, Maharashtra, India
关键词
Cloud Computing; Data Sharing; Identity Based Ring Signature; Forward Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Freedom of speech is one of the basic human rights. Today with the boom of technology and use of internet, the use of data sharing is correspondingly important. The number of users in the internet has increased by 700% in last fifteen years [1] [13]. Also, more than 90% of world's data on the internet which is shared, is uploaded in the last two years as of 2013 [12], and it is increasing exponentially every day. The number of users has increased, so the data and its usage. The security of data and the individual is of equal importance. This brings to the point that anonymity of the individual is to be considered as of prime importance, also as the saying goes; give a man a mask, and he will tell you the truth. There is no system in place to help with these requirements. The PKI system has a bottleneck to support such a vast number of users and their data. The identity based ring signature can be used instead to overcome this by excluding the part of certificate verification, as it makes use of identity signature, which speeds up the process. Forward security is implemented along with identity ring signature to advance the data security, which helps to eliminate the flaws of any big data sharing system where the revocation mechanism is used. This property helps when a key of a single user is compromised for a specific data, then still the past and future signatures for that user will remain valid and secure, also the other users will be unaffected. This is very important as it is very wrong to ask a huge number of users to re-authenticate their data in the time of such crisis. Therefore, to preserve data integrity, giving user anonymity, and support notion of forward security we propose two different identity based ring signature with forward security implemented by two different algorithms: HMAC, and AES, we also show the comparison of both.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Effective Data Sharing using Advanced Ring Signature with Forward Security
    Chandanapriya, E.
    Murali, G.
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 192 - 196
  • [2] Traffic data security sharing scheme based on blockchain and traceable ring signature for VANETs
    Zhang, Xiaohong
    Lai, Jiaming
    Moshayedi, Ata Jahangir
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (05) : 2349 - 2366
  • [3] Traffic data security sharing scheme based on blockchain and traceable ring signature for VANETs
    Xiaohong Zhang
    Jiaming Lai
    Ata Jahangir Moshayedi
    [J]. Peer-to-Peer Networking and Applications, 2023, 16 : 2349 - 2366
  • [4] Identity-Based Digital Signature Scheme with Forward Security
    Tang Lei
    Liu Yali
    [J]. PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 290 - 293
  • [5] Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
    Huang, Xinyi
    Liu, Joseph K.
    Tang, Shaohua
    Xiang, Yang
    Liang, Kaitai
    Xu, Li
    Zhou, Jianying
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (04) : 971 - 983
  • [6] Forward-secure identity-based signature: Security notions and construction
    Yu, Jia
    Hao, Rong
    Kong, Fanyu
    Cheng, Xiangguo
    Fan, Jianxi
    Chen, Yangkui
    [J]. INFORMATION SCIENCES, 2011, 181 (03) : 648 - 660
  • [7] Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security
    Wei, Jianghong
    Huang, Xinyi
    Liu, Wenfen
    Hu, Xuexian
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (07) : 843 - 868
  • [8] Medical Blockchain of Privacy Data Sharing Model Based on Ring Signature
    Wang, Rui-Jin
    Yu, Su-Zhe
    Li, Yue
    Tang, Yu-Cheng
    Zhang, Feng-Li
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2019, 48 (06): : 886 - 892
  • [9] Privacy-preserving security monitoring data sharing of new power system based on batch verification ring signature
    Wang, Yi
    Yang, Hao
    Zhang, Yiming
    Zhao, Yitao
    Yin, Shaoyang
    [J]. SECURITY AND PRIVACY, 2024,
  • [10] Effcient identity based ring signature
    Chow, SSM
    Yiu, SM
    Hui, LCK
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3531 : 499 - 512