Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Survey on Forward Security for Authentic and Anonymous Data Sharing with Auditing Integrity

Print
PDF
IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing
© 2016 by IJCA Journal
ICINC 2016 - Number 3
Year of Publication: 2016
Authors:
Vidya A. Gaikwad
Sachin D. Babar

Vidya A Gaikwad and Sachin D Babar. Article: Survey on Forward Security for Authentic and Anonymous Data Sharing with Auditing Integrity. IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing ICINC 2016(3):1-5, July 2016. Full text available. BibTeX

@article{key:article,
	author = {Vidya A. Gaikwad and Sachin D. Babar},
	title = {Article: Survey on Forward Security for Authentic and Anonymous Data Sharing with Auditing Integrity},
	journal = {IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing},
	year = {2016},
	volume = {ICINC 2016},
	number = {3},
	pages = {1-5},
	month = {July},
	note = {Full text available}
}

Abstract

Large amount of data sharing has never been less demanding to the advances of cloud computing, and a precise examination on the shared data gives a variety of advantages to both the society and individuals. Data sharing to an expansive number of members must consider a few issues, including effectiveness, data integrity and protection of data owner. Ring signature is a promising contender to develop a mysterious and authentic data sharing system. It allows a data owner to anonymously confirm his information which can be put into the cloud for storage or analysis reason. Yet the excessive testament check in the conventional public key infrastructure (PKI) setting turns into a bottleneck for this answer still adaptable. Identity-based (ID-based) ring signature, which takes out the procedure of certificate verification, can be utilized. In this paper, the upgraded concept of the secure ID-based signature provides so as to have a ring signature forward security: If a secret key of any user has been bargained, all past created signatures that incorporate these users still remain legitimate. This property is particularly critical to any huge scale data sharing system, as it is difficult to ask all data owner to re-authenticate their data regardless of the possibility that a secret key of one single user has been traded off. A strong and effective instantiation of the plan, exhibit its security and give an execution to show its sound judgment.

References

  • M. Abe, M. Ohkubo, and K. Suzuki. 1-out-of-n Signatures from a Variety of Keys. In ASIACRYPT 2002, volume 2501 of Lecture Notes in Computer Science, pages 415–432. Springer, 2002.
  • G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 255–270. Springer, 2000.
  • B. Wang, B. Li, and H. Li, Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud, Proc. IEEE Fifth Intl Conf. Cloud Computing, pp. 295-302, 2012
  • M. Bellare and S. Miner. A forward-secure digital signature scheme. In Crypto'99, volume 1666 of Lecture Notes in Computer Science, pages 431–448. Springer-Verlag, 1999.
  • J. -M. Bohli, N. Gruschka, M. Jensen, L. L. Iacono, and N. Marnau. Security and privacy-enhancing multicloud architectures. IEEE Trans. Dependable Sec. Comput. , 10(4):212–224, 2013.
  • D. Boneh, X. Boyen, and H. Shacham. "Short Group Signatures. " In CRYPTO 2004, volume 3152 of Lecture Notes in Computer Science, pages 41–55. Springer, 2004.
  • A. K. Awasthi and S. Lal. "Id-based ring signature and proxy ring signature schemes from bilinear pairings. " CoRR, abs/cs/0504097, 2005.
  • M. H. Au, J. K. Liu, T. H. Yuen, and D. S. Wong. "Id-based ring signature scheme secure in the standard model". In IWSEC, volume 4266 of Lecture Notes in Computer Science, pages 1–16. Springer, 2006.
  • R. Anderson. "Two remarks on public-key cryptology. " Manuscript, Sep. 2000. Relevant material presented by the author in an invited lecture at the Fourth ACM Conference on Computer and Communications Security, 1997.
  • A. Boldyreva. Efficient Threshold Signature, Multisignature and Blind Signature Schemes Based on the Gap Diffie-Hellman Group Signature Scheme. In PKC'03, volume 567 of Lecture Notes in Computer Science, pages 31–46. Springer, 2003.
  • E. Bresson, J. Stern, and M. Szydlo. Threshold ring signatures and applications to ad-hoc groups. In M. Yung, editor, CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 465–480. Springer, 2002.
  • S. S. M. Chow, V. K. -W. Wei, J. K. Liu, and T. H. Yuen. Ring signatures without random oracles. In ASIACCS, pages 297–302. ACM, 2006.