Effective Authentication Data Security

V Niharika
2017 International Journal of Advanced Research in Computer and Information Security  
Data sharing has ne'er been easier with the advances of cloud computing, associated associate correct analysis on the shared information provides an array of advantages to each the society and people. It permits a information owner to anonymously certify his data which might be place into the cloud for storage or analysis purpose. Nonetheless the expensive certificate verification within the ancient public key infrastructure (PKI) setting becomes a bottleneck for this resolution to be
more » ... Identity-based (ID-based) ring signature, that eliminates the method of certificate verification, are often used instead. During this paper, we have a tendency to more enhance the protection of ID-based ring signature by providing forward security: If a secret key of any user has been compromised, all previous generated signatures that embody this user still stay valid. This property is very vital to any massive scale information sharing system, because it is not possible to raise all information homeowners to authenticate their information although a secret key of 1 single user has been compromised. We offer a concrete and economical mental representation of our theme, prove its security and supply associate implementation to point out its usefulness. Effective Authentication Data Security 8
doi:10.21742/ijacis.2017.1.1.02 fatcat:25qwmebkxjdkjgyud7kuxo4fzm