z-logo
open-access-imgOpen Access
Optimal Data Sharing with Forward Security
Author(s) -
V. Deepika,
Borycki Elizabeth M.
Publication year - 2016
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2016911892
Subject(s) - computer science , computer security , data sharing , data science , medicine , pathology , alternative medicine
Cloud Computing is one of the best platform which provides huge data storage and data sharing all over the time and also easily available to the users. Data sharing in the cloud contains the several issues such as data integrity, authenticity, anonymity and privacy of data owner. Identity based (IDbased) ring signature gives anonymous and authentic data sharing system, by using this there is no need of costly certificate verification in the traditional public key infrastructure (PKI).This work, enhances the security of IDbased ring signature with forward security. Using forward security, if private key of the signer is compromised then all the previously generated signatures of that signer remains valid.Using forward security, one of the user may revoke access of file to the other members of the group.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom