Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Review on Forward Secure Identity based Ring Signature for Data Sharing in the Cloud

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Priti Rumao, Sumedh Pundkar

Priti Rumao and Sumedh Pundkar. Review on Forward Secure Identity based Ring Signature for Data Sharing in the Cloud. International Journal of Computer Applications 142(8):40-42, May 2016. BibTeX

	author = {Priti Rumao and Sumedh Pundkar},
	title = {Review on Forward Secure Identity based Ring Signature for Data Sharing in the Cloud},
	journal = {International Journal of Computer Applications},
	issue_date = {May 2016},
	volume = {142},
	number = {8},
	month = {May},
	year = {2016},
	issn = {0975-8887},
	pages = {40-42},
	numpages = {3},
	url = {},
	doi = {10.5120/ijca2016909894},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The key feature of cloud computing is one can access information any place, anywhere, at any time. So basically cloud computing is subscription based service where one can obtain network storage space and computer resources for data storage as well as data sharing. Due to high fame of cloud for data storage and sharing, large number of participants gets attracted to it but it leads to issue related to efficiency, Data integrity, privacy and authentication. To overcome these issues, concept of ring signature has been introduced for data sharing amongst large number of users. Ring signatures are used to provide user’s anonymity and signer’s privacy. Use of ID-based ring signature, removes the need of certificate verification which was done using public key infrastructure, hence reduce cost as well as introduction of forward security, further strengthen this system more. Use of weil pairing, keeps even shorter keys secure and it also requires less processing power. So the motivation of this paper is to propose a secure data reading and sharing scheme using above mentioned scheme.


  1. Huang, Joseph K. Liu+, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou “Cost-effective authentic and anonymous data sharing with forward security”.DOI:10.1109/TC.2014.2315619,IEEE Transactions on Computers.
  2. Javier Herranz IIIA, “Identity-Based Ring Signatures From RSA ” Artificial Intelligence Research Institute, CSIC, Spanish National Research Council, Campus UAB s/n, E-08193 Bellaterra, Spain
  3. P. P. Tsang, M. H. Au, J. K. Liu, W. Susilo, and D. S. Wong, “A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract),” in Proc. 4th Int. Conf. Provable Security, 2010, vol. 6402, pp. 166–183.
  4. Mihir Bellare and Sara K. Miner” A Forward-Secure Digital Signature Scheme” Dept. of Computer Science, &Engineering University of California at San Diego, 9500 Gilman Drive La Jolla, CA 92093, USA.
  5. Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, “Security And Privacy-Enhancing Multi cloud Architectures” Member, IEEE, Luigi Lo Iacono.
  6. Gene Itkis Boston University Computer Science Dept.111 Cumming ton St. Boston, “Forward security: Adaptive cryptography-time evolution” MA 02215, This e-mail address is being protected from spambots. You need JavaScript enabled to view it
  7. Adi Shamir, R. Rivest and Y. Tauman, “How to leak secret”, In Asiacrypt'01 LNCS 2248 (2001), 552-565.
  8. Aftuck, Alex Edward, "The Weil Pairing on Elliptic Curves and Its Cryptographic Applications" (2011). UNF Theses and Dissertations. Paper 139.


Authentication, data sharing, ring signature, forward security, cloud computing.