ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

TIME OPTIMIZATION FOR AUTHENTIC AND ANONYMOUS GROUP SHARING IN CLOUD STORAGE

Journal: JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (JCET) (Vol.9, No. 2)

Publication Date:

Authors : ; ;

Page : 16-31

Keywords : Anonymity; Authenticity; Forward secrecy Group sharing; Ring signature;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The Cloud computing is a rising technique which offers information sharing are more efficient, effective and economical approaches between group members. To create an authentic and anonymous information sharing, IDentity based Ring Signature (ID-RS) is one of the promising method between the groups. Ring signature conspire grants the chief or data owner to authenticate into the framework in an anonymous way. In conventional Public Key Infrastructure (PKI) information sharing plan contains certificate authentication process, which is a bottleneck due to its high cost for consumption of more time to signature. To maintain a strategic distance from this issue, we proposed Cost Optimized Identity-based Ring Signature with forward secrecy (COIRS) scheme. This plan evacuates the traditional certificate verification process. Just once the client should be confirmed by the chief giving his public details. The time required for this procedure is relatively not as much as customary public key framework. If the secret key holder has been compromised, all early generated signatures remain valid (Forward Secrecy). This paper examines how to optimize the time when sharing the documents to the cloud. We provide a protection from collision attack, which means revoked users will not get the original documents. In general better efficiency and secrecy can be provided for group sharing by applying approaches.

Last modified: 2018-09-15 20:37:14