About this Journal  |  Author Guidelines  |   Submit a Manuscript     

International Journal of Advanced Research in Computer and Information Security

Volume 1, No. 1, 2017, pp 7-12
http://dx.doi.org/10.21742/ijacis.2017.1.1.02

Abstract



Effective Authentication Data Security



    V Niharika
    1100-100 Department of Computer Science and Engineering KL University, Vaddeswaram, Guntur

    Abstract

    Data sharing has ne'er been easier with the advances of cloud computing, associated associate correct analysis on the shared information provides an array of advantages to each the society and people. It permits a information owner to anonymously certify his data which might be place into the cloud for storage or analysis purpose. Nonetheless the expensive certificate verification within the ancient public key infrastructure (PKI) setting becomes a bottleneck for this resolution to be climbable. Identity-based (ID-based) ring signature, that eliminates the method of certificate verification, are often used instead. During this paper, we have a tendency to more enhance the protection of ID-based ring signature by providing forward security: If a secret key of any user has been compromised, all previous generated signatures that embody this user still stay valid. This property is very vital to any massive scale information sharing system, because it is not possible to raise all information homeowners to authenticate their information although a secret key of 1 single user has been compromised. We offer a concrete and economical mental representation of our theme, prove its security and supply associate implementation to point out its usefulness.


 

Contact Us

  • PO Box 5074, Sandy Bay Tasmania 7005, Australia
  • Phone: +61 3 9028 5994