Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Data Sharing in Cloud without Certificate Verification Process Using Id-Based Proxy Ring Signature

S.  Balaji

Abstract


Data sharing has never been easier with the advances of cloud computing. Data sharing with a large number of participants must take into account several issues, including efficiency, data integrity and privacy of data owner. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. Unlike the group signature schemes the ring signature scheme requires neither a group manager, nor a setup procedure, nor the action of non-signing members. This signature does not reveal the identity of the signer but it may be varied with this signature that the signer belong to the possible signers set. There is no revocation manager. This allows unconditional anonymity of signer. Therefore, we introduce proxy signature scheme to allow a proxy signer to sign on behalf of an original signer. Using this scheme, we can achieve the singer ambiguity and key secrecy. To achieve user account security, we employee authentication process. In this authentication process user thump impression is capture and compared with the user data which are stored in database during registration process.


Keywords


Anonymity, Authenticity, Certificate, Encryption, Efficiency, Signature, Threshold

Full Text:

PDF

References


M. Abe, M. Ohkubo, and K. Suzuki. 1-out-of-n Signatures from a Variety of Keys. In ASIACRYPT 2002, volume 2501 of Lecture Notes in Computer Science, pages 415–432. Springer, 2002.

R. Anderson. Two remarks on public-key cryptology. Manuscript, Sep. 2000. Relevant material presented by the author in an invited lecture at the Fourth ACM Conference on Computer and Communications Security, 1997.

G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 255–270. Springer, 2000.

M. H. Au, J. K. Liu, T. H. Yuen, and D. S. Wong. Id-based ring signature scheme secure in the standard model. In IWSEC, volume 4266 of Lecture Notes in Computer Science, pages 1–16. Springer, 2006.

A. K. Awasthi and S. Lal. Id-based ring signature and proxy ring signature schemes from bilinear pairings. CoRR, abs/cs/0504097, 2005.

M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: formal definitions, simplified requirements and a construction based on general assumptions. In EUROCRYPT’03, volume 2656 of Lecture Notes in Computer Science. Springer, 2003.

M. Bellare and S. Miner. A forward-secure digital signature scheme. In Crypto’99, volume 1666 of Lecture Notes in Computer Science, pages 431–448. Springer-Verlag, 1999.

J.-M. Bohli, N. Gruschka, M. Jensen, L. L. Iacono, and N. Marnau. Security and privacy-enhancing multicloud architectures. IEEE Trans. Dependable Sec. Comput., 10(4):212–224, 2013.

A. Boldyreva. Efficient Threshold Signature, Multisignature and Blind Signature Schemes Based on the Gap Diffie-Hellman Group Signature Scheme. In PKC’03, volume 567 of Lecture Notes in Computer Science, pages 31–46. Springer, 2003.

D. Boneh, X. Boyen, and H. Shacham. Short Group Signatures. In CRYPTO 2004, volume 3152 of Lecture Notes in Computer Science, pages 41–55. Springer, 2004.

E. Bresson, J. Stern, and M. Szydlo. Threshold ring signatures and applications to ad-hoc groups. In M. Yung, editor, CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 465–480. Springer, 2002.

J. Camenisch. Efficient and generalized group signatures. In EUROCRYPT 97, volume 1233 of Lecture Notes in Computer Science, pages 465–479. Springer, 1997.

N. Chandran, J. Groth, and A. Sahai. Ring signatures of sublinear size without random oracles. In ICALP 2007, volume 4596 of Lecture Notes in Computer Science, pages 423–434. Springer, 2007.

K. Chard, K. Bubendorfer, S. Caton, and O. F. Rana. Social cloud computing: A vision for socially motivated resource sharing. IEEE T. Services Computing, 5(4):551–563, 2012.

D. Chaum and E. van Heyst. Group Signatures. In EUROCRYPT 91, volume 547 of Lecture Notes in Computer Science, pages 257–265. Springer, 1991.

L. Chen, C. Kudla, and K. G. Paterson. Concurrent signatures. In EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, pages 287–305. Springer, 2004.

H.-Y. Chien. Highly efficient id-based ring signature from pairings. In APSCC, pages 829–834, 2008.

S. S. Chow, R. W. Lui, L. C. Hui, and S. Yiu. Identity Based Ring Signature: Why, How and What Next. In D. Chadwick and G. Zhao, editors, EuroPKI, volume 3545 of Lecture Notes in Computer Science, pages 144–161. Springer, 2005.

S. S. M. Chow, V. K.-W. Wei, J. K. Liu, and T. H. Yuen. Ring signatures without random oracles. In ASIACCS, pages 297–302. ACM, 2006.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.