基于时间优化的可信匿名云前向保密

P. M. Reddy, R. Dasar, R. Tanuja, S. Manjula, K. Venugopal
{"title":"基于时间优化的可信匿名云前向保密","authors":"P. M. Reddy, R. Dasar, R. Tanuja, S. Manjula, K. Venugopal","doi":"10.1109/WOCN.2018.8556130","DOIUrl":null,"url":null,"abstract":"In recent days Cloud computing is a rising technique which offers data sharing with more efficient, effective and economical approaches between group members. To create an authentic and anonymous data sharing, IDentity based Ring Signature (ID-RS) is one of the promising technique between the groups. Ring signature scheme permits the manager or data owner to authenticate into the system in anonymous manner. In conventional Public Key Infrastructure (PKI) data sharing scheme contains certificate authentication process, which is a bottleneck because of its high cost. To avoid this problem, we proposed Cost Optimized Identity based Ring Signature with forward secrecy (COIRS) scheme. This scheme helps to remove the traditional certificate verification process. Only once the user needs to be verified by the manager giving his public details, then the cost and time required for this process is comparatively less than traditional public key infrastructure. If the secret key holder has been compromised, all early generated signatures remains valid (Forward Secrecy). This paper discuss about how to optimize the time and cost when sharing the files to the cloud. In general better efficiency and secrecy can be provided for group sharing by applying above approaches.","PeriodicalId":116005,"journal":{"name":"2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"60 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Forward Secrecy in Authentic and Anonymous Cloud with Time Optimization\",\"authors\":\"P. M. Reddy, R. Dasar, R. Tanuja, S. Manjula, K. Venugopal\",\"doi\":\"10.1109/WOCN.2018.8556130\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent days Cloud computing is a rising technique which offers data sharing with more efficient, effective and economical approaches between group members. To create an authentic and anonymous data sharing, IDentity based Ring Signature (ID-RS) is one of the promising technique between the groups. Ring signature scheme permits the manager or data owner to authenticate into the system in anonymous manner. In conventional Public Key Infrastructure (PKI) data sharing scheme contains certificate authentication process, which is a bottleneck because of its high cost. To avoid this problem, we proposed Cost Optimized Identity based Ring Signature with forward secrecy (COIRS) scheme. This scheme helps to remove the traditional certificate verification process. Only once the user needs to be verified by the manager giving his public details, then the cost and time required for this process is comparatively less than traditional public key infrastructure. If the secret key holder has been compromised, all early generated signatures remains valid (Forward Secrecy). This paper discuss about how to optimize the time and cost when sharing the files to the cloud. In general better efficiency and secrecy can be provided for group sharing by applying above approaches.\",\"PeriodicalId\":116005,\"journal\":{\"name\":\"2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN)\",\"volume\":\"60 1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WOCN.2018.8556130\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WOCN.2018.8556130","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

最近,云计算是一种新兴的技术,它以更高效、更有效和更经济的方式在群体成员之间提供数据共享。为了实现可信的匿名数据共享,基于身份的环签名(ID-RS)是一种很有前途的组间数据共享技术。环签名方案允许管理员或数据所有者以匿名方式对系统进行身份验证。在传统的公钥基础设施(Public Key Infrastructure, PKI)数据共享方案中,包含证书认证过程,这是其成本较高的瓶颈。为了避免这个问题,我们提出了基于成本优化身份的环签名前向保密(COIRS)方案。该方案有助于消除传统的证书验证过程。只有在用户需要由提供其公共详细信息的管理人员进行验证时,此过程所需的成本和时间才比传统的公钥基础设施要少。如果密钥持有者被泄露,所有早期生成的签名仍然有效(前向保密)。本文讨论了如何优化共享文件到云的时间和成本。一般来说,通过应用上述方法可以为组共享提供更好的效率和保密性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Forward Secrecy in Authentic and Anonymous Cloud with Time Optimization
In recent days Cloud computing is a rising technique which offers data sharing with more efficient, effective and economical approaches between group members. To create an authentic and anonymous data sharing, IDentity based Ring Signature (ID-RS) is one of the promising technique between the groups. Ring signature scheme permits the manager or data owner to authenticate into the system in anonymous manner. In conventional Public Key Infrastructure (PKI) data sharing scheme contains certificate authentication process, which is a bottleneck because of its high cost. To avoid this problem, we proposed Cost Optimized Identity based Ring Signature with forward secrecy (COIRS) scheme. This scheme helps to remove the traditional certificate verification process. Only once the user needs to be verified by the manager giving his public details, then the cost and time required for this process is comparatively less than traditional public key infrastructure. If the secret key holder has been compromised, all early generated signatures remains valid (Forward Secrecy). This paper discuss about how to optimize the time and cost when sharing the files to the cloud. In general better efficiency and secrecy can be provided for group sharing by applying above approaches.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信