Economic authentic and anonymous data sharing with forward security

被引:0
|
作者
Prabha, N. [1 ]
Banumathi, R. [1 ]
机构
[1] PRIST Univ, Comp Sci & Engn, Thanjavur 613403, Tamil Nadu, India
关键词
System authentication; Sharing information; Cloud server handling; Security aspects; Smart grid;
D O I
10.1016/j.matpr.2021.03.677
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the advancements of cloud services, sharing of information has never ever been easier, and intelligent prediction of shared information provides a slew of advantages also to individuals and society. When sharing data with a huge group of people, several factors must be considered, which include effectiveness, authentication, and the confidentiality of the cloud provider. A viable target for constructing an unidentified and genuine interoperability system is ring signature. It enables an owner to privately configure the data that can then be stored or analyzed in the cloud. However, in a conventional Public-KeyInfrastructure (PKI) setting, the expensive credential authentication becomes a limiting factor for this solution's scalability. Instead, an Identity based Ring Signature can be used, which eliminates the need for document verification. We enhance the safety of identity based ring signatures in this paper by adding forward protection: If a user's secret key is corrupted, all previously stored confirmations containing this user are still valid. The whole product is extremely crucial in any big information sharing system, because it is pointless to force all digital assets to conceptual metaphor their data if a single user's secret key is compromised. We demonstrate the practicality of our scheme by providing a tangible as well as efficient implementation and proving its security in good manner. (c) 2021 Elsevier Ltd. All rights reserved. Selection and peer-review under responsibility of the scientific committee of the 12th National Conference on Recent Advancements in Biomedical Engineering.
引用
收藏
页码:88 / 92
页数:5
相关论文
共 50 条
  • [1] Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
    Huang, Xinyi
    Liu, Joseph K.
    Tang, Shaohua
    Xiang, Yang
    Liang, Kaitai
    Xu, Li
    Zhou, Jianying
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (04) : 971 - 983
  • [2] Forward Secrecy in Authentic and Anonymous Cloud with Time Optimization
    Reddy, Muthi P.
    Dasar, Rekha Rangappa
    Tanuja, R.
    Manjula, S. H.
    Venugopal, K. R.
    [J]. 2018 FIFTEENTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2018,
  • [3] Effective Data Sharing using Advanced Ring Signature with Forward Security
    Chandanapriya, E.
    Murali, G.
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 192 - 196
  • [4] An efficient direct anonymous attestation scheme with forward security
    Feng, Deng-Guo
    Xu, Jing
    Chen, Xiao-Feng
    [J]. WSEAS Transactions on Communications, 2009, 8 (10): : 1076 - 1085
  • [5] Security and Data Sharing
    Richard, Mark
    Lebl, Leslie S.
    [J]. POLICY REVIEW, 2009, (154) : 79 - 92
  • [6] Anonymous Conference Key Distribution Scheme with Perfect Forward Security
    Li Fang
    Gao Huanzhi
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 330 - +
  • [7] Information sharing for science and security: The path forward
    Gronvall, GK
    [J]. ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2005, 230 : U1033 - U1034
  • [8] The economic incentives for sharing security information
    Gal-Or, E
    Ghose, A
    [J]. INFORMATION SYSTEMS RESEARCH, 2005, 16 (02) : 186 - 208
  • [9] Proposal for an Authentic and Profitable System for Secret Sharing of Data
    Patil, Kavita
    Wasnik, Chitra T.
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH, 2016, : 589 - 592
  • [10] Sharing Data for Public Security
    Bezzi, Michele
    Montagnon, Gilles
    Salzgeber, Vincent
    Trabelsi, Slim
    [J]. PRIVACY AND IDENTITY MANAGEMENT FOR LIFE, 2010, 320 : 188 - 197