Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Enhanced ID-Based Ring Signature by Validating Time Slots in Cloud Environment


Affiliations
1 School of Information Technology and Engineering, VIT University, Vellore, India
     

   Subscribe/Renew Journal


Sharing of Information has a number of problems, comprising integrity, information efficiency and safekeeping of data owner in cloud computing. Ring Signature methods are favorable choice to build an unidentified and authentic information sharing system. Ring have no managers, no setup systems, no denial systems, and no coordination: some person can pick any set of members that take account of himself, and sign message by making use of his secret key and the others' public keys, without getting their approval. By using Ring signatures we can leak top-secret information in an anonymous way. In the proposed Id-based ring signature the certificate validation process has been removed which is more cost effective. In this project we improved security in ring by implementing time slots i.e. if a super key of any user has lost then there is no need to change all the users' keys including the lost key user. Security re-confirmation is avoided in ring Signature by using SHA Algorithm .We have also expanded the level of security in diminished time, easy and effective manner.

Keywords

Cloud Computing, Signature, Data Owner, Time Slots, Authentication.
Subscription Login to verify subscription
User
Notifications
Font Size


Abstract Views: 246

PDF Views: 1




  • Enhanced ID-Based Ring Signature by Validating Time Slots in Cloud Environment

Abstract Views: 246  |  PDF Views: 1

Authors

A. Leeladhar
School of Information Technology and Engineering, VIT University, Vellore, India
B. Prabadevi
School of Information Technology and Engineering, VIT University, Vellore, India

Abstract


Sharing of Information has a number of problems, comprising integrity, information efficiency and safekeeping of data owner in cloud computing. Ring Signature methods are favorable choice to build an unidentified and authentic information sharing system. Ring have no managers, no setup systems, no denial systems, and no coordination: some person can pick any set of members that take account of himself, and sign message by making use of his secret key and the others' public keys, without getting their approval. By using Ring signatures we can leak top-secret information in an anonymous way. In the proposed Id-based ring signature the certificate validation process has been removed which is more cost effective. In this project we improved security in ring by implementing time slots i.e. if a super key of any user has lost then there is no need to change all the users' keys including the lost key user. Security re-confirmation is avoided in ring Signature by using SHA Algorithm .We have also expanded the level of security in diminished time, easy and effective manner.

Keywords


Cloud Computing, Signature, Data Owner, Time Slots, Authentication.