Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Secure Data Sharing in Cloud Without Certificate Verification Process Using Id-Based Proxy Ring Signature


Affiliations
1 Department of Information Technology, V.R.S College of Engineering and Technology, India
     

   Subscribe/Renew Journal


Data sharing has never been easier with the advances of cloud computing. Data sharing with a large number of participants must take into account several issues, including efficiency, data integrity and privacy of data owner. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. Unlike the group signature schemes the ring signature scheme requires neither a group manager, nor a setup procedure, nor the action of non-signing members. This signature does not reveal the identity of the signer but it may be varied with this signature that the signer belong to the possible signers set. There is no revocation manager. This allows unconditional anonymity of signer. Therefore, we introduce proxy signature scheme to allow a proxy signer to sign on behalf of an original signer. Using this scheme, we can achieve the singer ambiguity and key secrecy. To achieve user account security, we employee authentication process. In this authentication process user thump impression is capture and compared with the user data which are stored in database during registration process.

Keywords

Anonymity, Authenticity, Certificate, Encryption, Efficiency, Signature, Threshold.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 277

PDF Views: 4




  • Secure Data Sharing in Cloud Without Certificate Verification Process Using Id-Based Proxy Ring Signature

Abstract Views: 277  |  PDF Views: 4

Authors

S. Balaji
Department of Information Technology, V.R.S College of Engineering and Technology, India

Abstract


Data sharing has never been easier with the advances of cloud computing. Data sharing with a large number of participants must take into account several issues, including efficiency, data integrity and privacy of data owner. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. Unlike the group signature schemes the ring signature scheme requires neither a group manager, nor a setup procedure, nor the action of non-signing members. This signature does not reveal the identity of the signer but it may be varied with this signature that the signer belong to the possible signers set. There is no revocation manager. This allows unconditional anonymity of signer. Therefore, we introduce proxy signature scheme to allow a proxy signer to sign on behalf of an original signer. Using this scheme, we can achieve the singer ambiguity and key secrecy. To achieve user account security, we employee authentication process. In this authentication process user thump impression is capture and compared with the user data which are stored in database during registration process.

Keywords


Anonymity, Authenticity, Certificate, Encryption, Efficiency, Signature, Threshold.