Sharing of Information in a cloud environment is inevitable in onward of cloud computing environment.
Security in accessing cloud information has to consider many issues such as authentication, cost, time in
uploading and many other criteria. Authentication of data is must for utilizing the others data and uploading our
own data has become tedious. Getting Certificate and for every access is long process and cost increases. Ring
signature gives an assurance to the user to build an unidentified and accurate information sharing system. It
allows a data individualistic to innominate authenticate his data which can be put into the cloud for storage or
analysis purpose. In Identity-Based (ID Based ) Ring Signature Members of this cluster can easily share data
avoiding the pricey certificate verification as done in the usual procedure. Forward Security re authentication
overhead is avoided in Ring Signature by using RSA Algorithm we further provide increased level of security in
reduced time, efficient and simple manner.
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
The document proposes a system for cost-effective, anonymous, and authentic data sharing with forward security. It aims to address issues like efficiency, data integrity, and privacy in large-scale data sharing systems. The system uses identity-based ring signatures to allow anonymous authentication of data by owners. It further enhances security by providing forward security, meaning previously generated signatures remain valid even if a secret key is compromised in the future. The authors provide a concrete scheme, prove its security, and implement it to demonstrate practicality.
Cost effective authentic and anonymous data sharing with forward securityPvrtechnologies Nellore
This document proposes a system for anonymous and authentic data sharing on a large scale using identity-based ring signatures with forward security. It aims to address issues of efficiency, data integrity, and privacy for data owners. The system would allow data owners to anonymously authenticate their data, which could then be stored and analyzed on the cloud. Identity-based ring signatures eliminate the need for certificate verification, improving efficiency. Forward security is added so that if a user's secret key is compromised, previously generated signatures including that user remain valid. This is important for large-scale data sharing systems to avoid needing to reauthenticate all data if a single key is compromised. The document outlines the modules of the proposed system and describes identity-based ring signatures
Cost effective authentic and anonymous data sharing with forward securityLeMeniz Infotech
Cost effective authentic and anonymous data sharing with forward security
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
This document discusses cost-effective and anonymous data sharing using forward secure identity-based ring signatures. It proposes a new notion of forward secure ID-based ring signatures that allow ID-based ring signature schemes to provide forward security. This is the first scheme to provide this feature for ring signatures in an ID-based setting. The scheme provides unconditional anonymity and can be proven to be forward-securely unforgeable in the random oracle model under the RSA assumption. It is efficient, requiring only one exponentiation for key updates and no pairings. This scheme enables authentic and anonymous data sharing in large-scale systems like smart grids.
4.authentication and key agreement based on anonymous identity for peer to-pe...Venkat Projects
The document proposes a peer-to-peer cloud authentication and key agreement (PCAKA) scheme based on anonymous identity to enable secure data migration between cloud servers. The scheme uses elliptic curve cryptography without a trusted authority to establish session keys between cloud providers. It protects server and user privacy through anonymous identities while enabling identity traceability for malicious servers. The proposed approach aims to develop trust between clouds and facilitate efficient cross-cloud data migration for mobile users.
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET Journal
This document proposes a method for anonymous and authentic data sharing with enhanced key security using identity-based ring signatures. It discusses how identity-based cryptography eliminates the need for public key certificates and the associated validation process. The proposed method uses identity-based ring signatures to allow a third party auditor to privately validate shared data in the cloud while maintaining signer anonymity. It also enhances security by providing forward security, meaning previously generated signatures remain valid even if a signer's private key is compromised in the future. This property is important for large-scale data sharing systems.
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
This document summarizes a research paper that proposes a method for anonymous user authentication and access control of securely stored data in cloud computing. The method aims to ensure user anonymity while authenticating users and allowing flexible access control. It uses attribute-based signatures to authenticate users without revealing their identities. The access control scheme is decentralized and can revoke user access. It also aims to automatically send any uploaded evidence or reports directly to relevant organizations if the original user is unable to post it, while still maintaining user anonymity. The document discusses concepts like anonymous communication, privacy and the AES encryption algorithm used in the proposed method.
This document proposes a scheme to enhance security in cloud computing. It discusses how a user's data stored with a cloud provider could be at risk if the provider's internal staff can access the encrypted data. The proposed scheme aims to avoid unauthorized access of user data by sending a message to the user's mobile number when a transaction starts. It also displays fake information if login is unsuccessful to avoid further intrusion attempts. Common security methods for user data protection include encryption before storage, user authentication, and secure transmission channels. Cloud computing provides on-demand access to computing resources over the Internet and allows users to access services without knowledge of the infrastructure.
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
The document proposes a system for cost-effective, anonymous, and authentic data sharing with forward security. It aims to address issues like efficiency, data integrity, and privacy in large-scale data sharing systems. The system uses identity-based ring signatures to allow anonymous authentication of data by owners. It further enhances security by providing forward security, meaning previously generated signatures remain valid even if a secret key is compromised in the future. The authors provide a concrete scheme, prove its security, and implement it to demonstrate practicality.
Cost effective authentic and anonymous data sharing with forward securityPvrtechnologies Nellore
This document proposes a system for anonymous and authentic data sharing on a large scale using identity-based ring signatures with forward security. It aims to address issues of efficiency, data integrity, and privacy for data owners. The system would allow data owners to anonymously authenticate their data, which could then be stored and analyzed on the cloud. Identity-based ring signatures eliminate the need for certificate verification, improving efficiency. Forward security is added so that if a user's secret key is compromised, previously generated signatures including that user remain valid. This is important for large-scale data sharing systems to avoid needing to reauthenticate all data if a single key is compromised. The document outlines the modules of the proposed system and describes identity-based ring signatures
Cost effective authentic and anonymous data sharing with forward securityLeMeniz Infotech
Cost effective authentic and anonymous data sharing with forward security
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
This document discusses cost-effective and anonymous data sharing using forward secure identity-based ring signatures. It proposes a new notion of forward secure ID-based ring signatures that allow ID-based ring signature schemes to provide forward security. This is the first scheme to provide this feature for ring signatures in an ID-based setting. The scheme provides unconditional anonymity and can be proven to be forward-securely unforgeable in the random oracle model under the RSA assumption. It is efficient, requiring only one exponentiation for key updates and no pairings. This scheme enables authentic and anonymous data sharing in large-scale systems like smart grids.
4.authentication and key agreement based on anonymous identity for peer to-pe...Venkat Projects
The document proposes a peer-to-peer cloud authentication and key agreement (PCAKA) scheme based on anonymous identity to enable secure data migration between cloud servers. The scheme uses elliptic curve cryptography without a trusted authority to establish session keys between cloud providers. It protects server and user privacy through anonymous identities while enabling identity traceability for malicious servers. The proposed approach aims to develop trust between clouds and facilitate efficient cross-cloud data migration for mobile users.
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET Journal
This document proposes a method for anonymous and authentic data sharing with enhanced key security using identity-based ring signatures. It discusses how identity-based cryptography eliminates the need for public key certificates and the associated validation process. The proposed method uses identity-based ring signatures to allow a third party auditor to privately validate shared data in the cloud while maintaining signer anonymity. It also enhances security by providing forward security, meaning previously generated signatures remain valid even if a signer's private key is compromised in the future. This property is important for large-scale data sharing systems.
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
This document summarizes a research paper that proposes a method for anonymous user authentication and access control of securely stored data in cloud computing. The method aims to ensure user anonymity while authenticating users and allowing flexible access control. It uses attribute-based signatures to authenticate users without revealing their identities. The access control scheme is decentralized and can revoke user access. It also aims to automatically send any uploaded evidence or reports directly to relevant organizations if the original user is unable to post it, while still maintaining user anonymity. The document discusses concepts like anonymous communication, privacy and the AES encryption algorithm used in the proposed method.
This document proposes a scheme to enhance security in cloud computing. It discusses how a user's data stored with a cloud provider could be at risk if the provider's internal staff can access the encrypted data. The proposed scheme aims to avoid unauthorized access of user data by sending a message to the user's mobile number when a transaction starts. It also displays fake information if login is unsuccessful to avoid further intrusion attempts. Common security methods for user data protection include encryption before storage, user authentication, and secure transmission channels. Cloud computing provides on-demand access to computing resources over the Internet and allows users to access services without knowledge of the infrastructure.
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsIRJET Journal
This document proposes an identity-based ring signature scheme to enable secure data sharing in cloud storage groups. It aims to provide forward security, authenticity, and anonymity for massive data sharing in the cloud. The proposed scheme uses identity-based ring signatures that do not require certificate verification, unlike conventional public key infrastructure approaches. It also achieves secure key distribution, fine-grained access control, prevention of collusion attacks, and secure user revocation. The scheme allows data to be securely shared within groups in the cloud while preserving the privacy of users.
IRJET - Improving Password System using BlockchainIRJET Journal
This document proposes a blockchain-based system for storing usernames and passwords in an encrypted format to address the problems of password overload and security of third-party password managers. It describes how usernames and passwords would be stored immutably in the blockchain and retrieved when needed, improving on traditional methods by eliminating the risks of a third party database being hacked. The system aims to make password management more convenient and secure by leveraging the cryptography and decentralization of blockchain technology.
An Efficient Approach for Data Security in Cloud Environment using Watermarki...IRJET Journal
This document proposes a method for enhancing data security in cloud environments using a combination of robust reversible watermarking and RSA digital signatures. The method works by encrypting a confidential message from a mobile user using RSA, watermarking the encrypted data using robust reversible watermarking in a cover image, and storing the embedded image in the cloud. At retrieval, the embedded image is extracted, the secret message and cover image are separated, the message is decrypted using the generated hash value, and the integrity of the data is verified by comparing hash values. The combination of RSA and robust reversible watermarking is shown to improve data confidentiality and security compared to existing methods while allowing full recovery of the original data and cover image. Simulation results
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
IRJET- A Survey Paper on Secured Email Server Using 3DESIRJET Journal
This document discusses a survey of using triple data encryption standard (3DES) to secure email servers. 3DES encrypts data blocks three times using three 56-bit keys, increasing security over single DES. It summarizes previous research on 3DES and two-factor authentication. The document then describes how 3DES works, providing greater security than DES by encrypting data three times with three keys. It concludes that 3DES provides high-level security for encrypting email communications and protecting against hacking if data is compromised.
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...IJERA Editor
This document proposes a rank-based deniable attribute-based encryption scheme for cloud storage to enhance data privacy and access control. A ranking algorithm assigns each user a rank based on attributes like joining date and designation. Files uploaded to the cloud are encrypted and associated with a rank. A user can only decrypt a file if their rank matches the file's rank. Otherwise, a fake file is downloaded to convince unauthorized users not to attempt further access. The scheme aims to protect user privacy even if authorities force cloud providers to disclose user data, as the authorities cannot determine if disclosed data is real or fake. Evaluation results show the scheme effectively controls access and prioritizes processing for higher-ranked users.
IRJET- Crypto-Currencies How Secure are they?IRJET Journal
This document discusses the security of cryptocurrencies. It begins by defining cryptocurrency and explaining how cryptocurrency transactions work using blockchain technology. It then discusses some of the key properties of cryptocurrencies like irreversibility, pseudonymity, and controlled supply. The document outlines some benefits of cryptocurrencies like lack of third party seizure and anonymity, but also challenges like high energy usage and possibility of lost wallets. It then discusses some specific security issues with blockchain like its complexity, size of the network, and traditional scams. It concludes by covering security issues with cryptocurrencies like spoofing payment information, errors in user addresses, and loss of wallet files.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The Recent Trend: Vigorous unidentified validation access control system with...IJERA Editor
Service Providers can grow their business by selling our cloud authentication service that can be fully branded
to the Service Provider or if required a Service. The proposed enhanced decentralized access control scheme for
secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies
the authenticity of the series without knowing the user’s identity before storing data. The scheme also has the
added feature of access control in which only valid users are able to decrypt the stored information. The scheme
prevents replay attacks and supports creation, modification, and reading data stored in the cloud. It addresses
user revocation. Moreover, our authentication and access control scheme is decentralized and robust, unlike
other access control schemes designed for clouds which are centralized. The communication, hiding attributes,
increasing high security in access, computation, and storage overheads are comparable to centralized
approaches.
In Existing, it is based on ABE (attribute based encryption) technique which is a centralized approach, where a
single Key Distribution Centre (KDC) distributes secret keys and attributes to all users using asymmetric key
approach. We propose a new decentralized access control method for storing data by providing security in
clouds and also we hide the attributes and access rule of a user. The cloud validates the authentication of the
sequence without knowing the users characteristics previous to the data store. By using this approach only
certified users have right to use the suitable attributes. In future, time based file revocation scheme can be used
to assure the deletion of a file. When time limit of a file expires, we implement the policy based renewal of time
to that file.
Protecting Facebook Account From Malicious Attacking ApplicationsIRJET Journal
This document discusses techniques for protecting Facebook accounts from malicious attacking applications. It proposes a novel rank-based image watermarking strategy that embeds a secret message into images using digital watermarking and encryption. The strategy splits images into pieces, embeds watermarks into DCT coefficients of blocks, and encrypts the secret message before combining it with the watermarks. This provides high security for secret messages shared through image watermarking while maintaining imperceptibility and robustness against attacks. The system can detect hackers who try to decrypt images with the wrong secret key by notifying an administrator.
Advanced Multi-Encryption Technique in Cloud ComputingAM Publications
Cloud Computing is one of the latest technology and it is growing rapidly .Cloud Computing provides
service over the internet. In the existing approach the revoked users are not tracked properly and there is no extra
protection on the data that is uploaded to the cloud server. The users are not authenticated properly. The best
approach is that the users are authenticated twice. Once with the help of password users are authenticated and then
the secret code will be sent to the authenticated users mobile with the help of interfacing technology like GSM and
then the user’s should enter the secret code to authenticate they are the valid users. In this paper the data that is
uploaded to the cloud server is encrypted twice by the data-owner and that data is later re-encrypted by the cloud
server. Multi- layer encryption technique is performed in order to provide extra security for the data that is uploaded to
the cloud server. The data that is uploaded to the cloud server is highly secure and user’s authentication is validated
twice so that the valid user can access data flexibly and reliably.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
This document summarizes a proposed cloud security and data integrity framework that provides client accountability. The framework aims to address issues like lack of user control over cloud data, need for data transparency and tracking, and ensuring data integrity. It proposes using JAR (Java Archive) files for data sharing due to benefits like portability. The framework incorporates client-side verification using MD5 hashing, digital signature-based authentication of JAR files, and use of HMAC to ensure data integrity. It also uses password-based encryption of log files to keep them tamper-proof. The framework is intended to provide both accountability and security for data sharing in cloud environments.
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
This document discusses techniques for secure and fast transmission of data in mobile ad hoc networks (MANETs). It proposes using identity-based cryptography with visual cryptography. For identity-based cryptography, the RSA cryptosystem is used to generate public and private keys, with Vedic mathematics adopted for fast calculations. Vedic mathematics allows for faster prime number calculations compared to modern mathematics. Visual cryptography allows images to be encrypted and decrypted by the human visual system without computation. The techniques aim to securely and efficiently transmit encrypted images and data in MANETs.
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...IRJET Journal
This document presents a proposed system for confidential login and encrypted data storage using visual cryptography and steganography. The key aspects are:
1. A visual cryptography scheme is used to generate image CAPTCHAs for user login verification, aiming to prevent phishing attacks.
2. A steganography technique embeds encrypted user data into video files by breaking the data into chunks and hiding chunks in the least significant bits of different video frames, making the hidden data imperceptible.
3. Algorithms like scene change detection, split algorithm, and least significant bit are utilized in the steganography process.
The proposed system aims to provide stronger security and privacy for user login and data storage compared to
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
This document summarizes and compares previous research on secure offline micro-payment systems. It describes FRoDO, a new proposed system that features an identity element and coin element to enable secure offline payments. The identity element is embedded in the customer's device and is used to link a coin element to that specific device. This provides two-factor authentication. The coin element uses a physical unclonable function and regenerative keys to securely read and redeem digital coins. The document reviews related work on context-aware and software-based authentication solutions, offline micropayment schemes without trusted hardware, and approaches using hash-chaining in mobile networks. It concludes that FRoDO is the first solution able to provide fully secure offline
This document summarizes a research paper on using public key cryptography with an offline centralized server for secure communication in mission-critical networks. It discusses how public-private key pairs can provide security features like authentication, integrity, confidentiality and non-repudiation. It then describes a proposed scheme called SMOCK that uses a small number of cryptographic keys pre-stored offline at individual nodes to enable authentication with almost zero communication overhead and high availability. The document provides background on public key infrastructure (PKI) components like certificate authorities, registration authorities, repositories, and applications before discussing security requirements.
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryIJERA Editor
Enhanced Privacy in Mobile Online Social Networks to providing the location information to the User /server in the
online location server. MOSNs, more and more users‘ location information will be collected by the service providers
in mOSN. The users‘ privacy, including location privacy and social network privacy can be improved using the User
Registration & encryption of the data stored into the server. It should aiming at achieving enhanced privacy against
the insider attack launched by the service providers in mOSNs, we introduce a new architecture with multiple location
servers for the first time and propose a secure solution supporting location sharing among friends and strangers in
location-based applications. In our construction, the user‘s friend set in each friend‘s query submitted to the location
servers is divided into multiple subsets by the social network server randomly. Location-based services (LBSs) are
one of the most important components in mOSNs, which provides information and entertainment service based on the
geographical position of the mobile device. The entity of users, with mobile devices, is able to communicate with
other users and share their locations. Online social network Server manages users‘ identity-related information such as
users‘ profiles and friend lists. Location server stores users‘ location information and provides LBSs according to the
requests sent from users. Here we are going to improve the user location privacy, social network privacy.
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
In recent days Cloud computing is a rising technique
which offers data sharing with more efficient, effective and
economical approaches between group members. To create an
authentic and anonymous data sharing, IDentity based Ring
Signature (ID-RS) is one of the promising technique between
the groups. Ring signature scheme permits the manager or data
owner to authenticate into the system in anonymous manner.
In conventional Public Key Infrastructure (PKI) data sharing
scheme contains certificate authentication process, which is a
bottleneck because of its high cost. To avoid this problem, we
proposed Cost Optimized Identity based Ring Signature with
forward secrecy (COIRS) scheme. This scheme helps to remove
the traditional certificate verification process. Only once the user
needs to be verified by the manager giving his public details. The
cost and time required for this process is comparatively less than
traditional public key infrastructure. If the secret key holder has
been compromised, all early generated signatures remains valid
(Forward Secrecy). This paper discuss about how to optimize the
time and cost when sharing the files to the cloud. We provide a
protection from collision attack, which means revoked users will
not get the original documents. In general better efficiency and
secrecy can be provided for group sharing by applying above
approaches.
Cost effective authentic and anonymousnexgentech15
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Cost-Effective Authentic and Anonymous Data Sharing with Forward Securitynexgentechnology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsIRJET Journal
This document proposes an identity-based ring signature scheme to enable secure data sharing in cloud storage groups. It aims to provide forward security, authenticity, and anonymity for massive data sharing in the cloud. The proposed scheme uses identity-based ring signatures that do not require certificate verification, unlike conventional public key infrastructure approaches. It also achieves secure key distribution, fine-grained access control, prevention of collusion attacks, and secure user revocation. The scheme allows data to be securely shared within groups in the cloud while preserving the privacy of users.
IRJET - Improving Password System using BlockchainIRJET Journal
This document proposes a blockchain-based system for storing usernames and passwords in an encrypted format to address the problems of password overload and security of third-party password managers. It describes how usernames and passwords would be stored immutably in the blockchain and retrieved when needed, improving on traditional methods by eliminating the risks of a third party database being hacked. The system aims to make password management more convenient and secure by leveraging the cryptography and decentralization of blockchain technology.
An Efficient Approach for Data Security in Cloud Environment using Watermarki...IRJET Journal
This document proposes a method for enhancing data security in cloud environments using a combination of robust reversible watermarking and RSA digital signatures. The method works by encrypting a confidential message from a mobile user using RSA, watermarking the encrypted data using robust reversible watermarking in a cover image, and storing the embedded image in the cloud. At retrieval, the embedded image is extracted, the secret message and cover image are separated, the message is decrypted using the generated hash value, and the integrity of the data is verified by comparing hash values. The combination of RSA and robust reversible watermarking is shown to improve data confidentiality and security compared to existing methods while allowing full recovery of the original data and cover image. Simulation results
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
IRJET- A Survey Paper on Secured Email Server Using 3DESIRJET Journal
This document discusses a survey of using triple data encryption standard (3DES) to secure email servers. 3DES encrypts data blocks three times using three 56-bit keys, increasing security over single DES. It summarizes previous research on 3DES and two-factor authentication. The document then describes how 3DES works, providing greater security than DES by encrypting data three times with three keys. It concludes that 3DES provides high-level security for encrypting email communications and protecting against hacking if data is compromised.
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...IJERA Editor
This document proposes a rank-based deniable attribute-based encryption scheme for cloud storage to enhance data privacy and access control. A ranking algorithm assigns each user a rank based on attributes like joining date and designation. Files uploaded to the cloud are encrypted and associated with a rank. A user can only decrypt a file if their rank matches the file's rank. Otherwise, a fake file is downloaded to convince unauthorized users not to attempt further access. The scheme aims to protect user privacy even if authorities force cloud providers to disclose user data, as the authorities cannot determine if disclosed data is real or fake. Evaluation results show the scheme effectively controls access and prioritizes processing for higher-ranked users.
IRJET- Crypto-Currencies How Secure are they?IRJET Journal
This document discusses the security of cryptocurrencies. It begins by defining cryptocurrency and explaining how cryptocurrency transactions work using blockchain technology. It then discusses some of the key properties of cryptocurrencies like irreversibility, pseudonymity, and controlled supply. The document outlines some benefits of cryptocurrencies like lack of third party seizure and anonymity, but also challenges like high energy usage and possibility of lost wallets. It then discusses some specific security issues with blockchain like its complexity, size of the network, and traditional scams. It concludes by covering security issues with cryptocurrencies like spoofing payment information, errors in user addresses, and loss of wallet files.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The Recent Trend: Vigorous unidentified validation access control system with...IJERA Editor
Service Providers can grow their business by selling our cloud authentication service that can be fully branded
to the Service Provider or if required a Service. The proposed enhanced decentralized access control scheme for
secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies
the authenticity of the series without knowing the user’s identity before storing data. The scheme also has the
added feature of access control in which only valid users are able to decrypt the stored information. The scheme
prevents replay attacks and supports creation, modification, and reading data stored in the cloud. It addresses
user revocation. Moreover, our authentication and access control scheme is decentralized and robust, unlike
other access control schemes designed for clouds which are centralized. The communication, hiding attributes,
increasing high security in access, computation, and storage overheads are comparable to centralized
approaches.
In Existing, it is based on ABE (attribute based encryption) technique which is a centralized approach, where a
single Key Distribution Centre (KDC) distributes secret keys and attributes to all users using asymmetric key
approach. We propose a new decentralized access control method for storing data by providing security in
clouds and also we hide the attributes and access rule of a user. The cloud validates the authentication of the
sequence without knowing the users characteristics previous to the data store. By using this approach only
certified users have right to use the suitable attributes. In future, time based file revocation scheme can be used
to assure the deletion of a file. When time limit of a file expires, we implement the policy based renewal of time
to that file.
Protecting Facebook Account From Malicious Attacking ApplicationsIRJET Journal
This document discusses techniques for protecting Facebook accounts from malicious attacking applications. It proposes a novel rank-based image watermarking strategy that embeds a secret message into images using digital watermarking and encryption. The strategy splits images into pieces, embeds watermarks into DCT coefficients of blocks, and encrypts the secret message before combining it with the watermarks. This provides high security for secret messages shared through image watermarking while maintaining imperceptibility and robustness against attacks. The system can detect hackers who try to decrypt images with the wrong secret key by notifying an administrator.
Advanced Multi-Encryption Technique in Cloud ComputingAM Publications
Cloud Computing is one of the latest technology and it is growing rapidly .Cloud Computing provides
service over the internet. In the existing approach the revoked users are not tracked properly and there is no extra
protection on the data that is uploaded to the cloud server. The users are not authenticated properly. The best
approach is that the users are authenticated twice. Once with the help of password users are authenticated and then
the secret code will be sent to the authenticated users mobile with the help of interfacing technology like GSM and
then the user’s should enter the secret code to authenticate they are the valid users. In this paper the data that is
uploaded to the cloud server is encrypted twice by the data-owner and that data is later re-encrypted by the cloud
server. Multi- layer encryption technique is performed in order to provide extra security for the data that is uploaded to
the cloud server. The data that is uploaded to the cloud server is highly secure and user’s authentication is validated
twice so that the valid user can access data flexibly and reliably.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
This document summarizes a proposed cloud security and data integrity framework that provides client accountability. The framework aims to address issues like lack of user control over cloud data, need for data transparency and tracking, and ensuring data integrity. It proposes using JAR (Java Archive) files for data sharing due to benefits like portability. The framework incorporates client-side verification using MD5 hashing, digital signature-based authentication of JAR files, and use of HMAC to ensure data integrity. It also uses password-based encryption of log files to keep them tamper-proof. The framework is intended to provide both accountability and security for data sharing in cloud environments.
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
This document discusses techniques for secure and fast transmission of data in mobile ad hoc networks (MANETs). It proposes using identity-based cryptography with visual cryptography. For identity-based cryptography, the RSA cryptosystem is used to generate public and private keys, with Vedic mathematics adopted for fast calculations. Vedic mathematics allows for faster prime number calculations compared to modern mathematics. Visual cryptography allows images to be encrypted and decrypted by the human visual system without computation. The techniques aim to securely and efficiently transmit encrypted images and data in MANETs.
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...IRJET Journal
This document presents a proposed system for confidential login and encrypted data storage using visual cryptography and steganography. The key aspects are:
1. A visual cryptography scheme is used to generate image CAPTCHAs for user login verification, aiming to prevent phishing attacks.
2. A steganography technique embeds encrypted user data into video files by breaking the data into chunks and hiding chunks in the least significant bits of different video frames, making the hidden data imperceptible.
3. Algorithms like scene change detection, split algorithm, and least significant bit are utilized in the steganography process.
The proposed system aims to provide stronger security and privacy for user login and data storage compared to
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
This document summarizes and compares previous research on secure offline micro-payment systems. It describes FRoDO, a new proposed system that features an identity element and coin element to enable secure offline payments. The identity element is embedded in the customer's device and is used to link a coin element to that specific device. This provides two-factor authentication. The coin element uses a physical unclonable function and regenerative keys to securely read and redeem digital coins. The document reviews related work on context-aware and software-based authentication solutions, offline micropayment schemes without trusted hardware, and approaches using hash-chaining in mobile networks. It concludes that FRoDO is the first solution able to provide fully secure offline
This document summarizes a research paper on using public key cryptography with an offline centralized server for secure communication in mission-critical networks. It discusses how public-private key pairs can provide security features like authentication, integrity, confidentiality and non-repudiation. It then describes a proposed scheme called SMOCK that uses a small number of cryptographic keys pre-stored offline at individual nodes to enable authentication with almost zero communication overhead and high availability. The document provides background on public key infrastructure (PKI) components like certificate authorities, registration authorities, repositories, and applications before discussing security requirements.
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryIJERA Editor
Enhanced Privacy in Mobile Online Social Networks to providing the location information to the User /server in the
online location server. MOSNs, more and more users‘ location information will be collected by the service providers
in mOSN. The users‘ privacy, including location privacy and social network privacy can be improved using the User
Registration & encryption of the data stored into the server. It should aiming at achieving enhanced privacy against
the insider attack launched by the service providers in mOSNs, we introduce a new architecture with multiple location
servers for the first time and propose a secure solution supporting location sharing among friends and strangers in
location-based applications. In our construction, the user‘s friend set in each friend‘s query submitted to the location
servers is divided into multiple subsets by the social network server randomly. Location-based services (LBSs) are
one of the most important components in mOSNs, which provides information and entertainment service based on the
geographical position of the mobile device. The entity of users, with mobile devices, is able to communicate with
other users and share their locations. Online social network Server manages users‘ identity-related information such as
users‘ profiles and friend lists. Location server stores users‘ location information and provides LBSs according to the
requests sent from users. Here we are going to improve the user location privacy, social network privacy.
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
In recent days Cloud computing is a rising technique
which offers data sharing with more efficient, effective and
economical approaches between group members. To create an
authentic and anonymous data sharing, IDentity based Ring
Signature (ID-RS) is one of the promising technique between
the groups. Ring signature scheme permits the manager or data
owner to authenticate into the system in anonymous manner.
In conventional Public Key Infrastructure (PKI) data sharing
scheme contains certificate authentication process, which is a
bottleneck because of its high cost. To avoid this problem, we
proposed Cost Optimized Identity based Ring Signature with
forward secrecy (COIRS) scheme. This scheme helps to remove
the traditional certificate verification process. Only once the user
needs to be verified by the manager giving his public details. The
cost and time required for this process is comparatively less than
traditional public key infrastructure. If the secret key holder has
been compromised, all early generated signatures remains valid
(Forward Secrecy). This paper discuss about how to optimize the
time and cost when sharing the files to the cloud. We provide a
protection from collision attack, which means revoked users will
not get the original documents. In general better efficiency and
secrecy can be provided for group sharing by applying above
approaches.
Cost effective authentic and anonymousnexgentech15
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Cost-Effective Authentic and Anonymous Data Sharing with Forward Securitynexgentechnology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
This document proposes a scheme to enhance security in cloud computing. It discusses how a user's data stored with a cloud provider could be at risk if the provider's internal staff can access the encrypted data. The proposed scheme aims to avoid unauthorized access of user data by sending a message to the user's mobile number when a transaction starts and displaying fake information for unsuccessful login attempts to avoid further trials. It also provides background on cloud computing and common security methods like encryption, authentication, and secure channels. The introduction describes the proposed system's process of requesting access to protected data, authenticating the user, and conditionally providing a fake database in the case of hacking attempts.
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
1) The document proposes a secure data sharing scheme for sharing data within group members in the cloud. It aims to prevent collusion attacks and allow for secure sharing of data even as group membership changes dynamically.
2) The scheme uses encryption with private keys so that if a user's key is leaked, it will be difficult for others to access the shared data. A trusted authority authenticates users and stores encryption keys to determine responsibility if issues arise.
3) The scheme achieves secure key distribution without requiring secure communication channels by using public key verification. It also allows for fine-grained access control and secure revocation such that revoked users cannot access shared data even by colluding with the cloud.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
secure multi-owner data sharing for dynamic groupsSuchithra Balan
The document presents a secure data sharing scheme for dynamic groups in cloud computing. The scheme leverages group signature and dynamic broadcast encryption techniques to allow cloud users to anonymously share data with others in a group while preserving identity privacy from an untrusted cloud. It aims to securely support data sharing in dynamic groups where attributes are not fixed and multiple owners are possible. The scheme's storage overhead and encryption costs are independent of the number of revoked users.
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storageijtsrd
Data contribution in the cloud is a procedure so as to allow users to expediently right of entry information in excess of the cloud. The information holder outsources their data in the cloud due to cost lessening and the huge amenities provided by cloud services. Information holder is not able to manage over their information, since cloud examination contributor is a third party contributor. The main disaster with data partaking in the cloud is the seclusion and safety measures issues. Different techniques are obtainable to sustain user seclusion and protected data sharing. This paper focal point on different schemes to contract by means of protected data partaking such as information contribution with forward security, protected information partaking for energetic groups, quality based information partaking, encrypted data sharing and mutual influence Based Privacy Preserving verification set of rules for right to use manage of outsourced information. S. Nandhini Devi | Mr. S. Rajarajan "A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29345.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29345/a-data-sharing-protocol-to-minimize-security-and-privacy-risks-in-cloud-storage/s-nandhini-devi
A Survey on Secure Data Sharing with Forward Security in Cloud ComputingIRJET Journal
This document summarizes a research paper on secure data sharing with forward security in cloud computing using identity-based ring signatures. It first provides an abstract of the paper, describing how ring signatures allow anonymous authentication of data shared in the cloud. It then discusses challenges with key escrow in identity-based cryptography and how ring signatures address this. The document explains the concepts of identity-based cryptography, ring signatures, and group-oriented cryptography. It describes how identity-based ring signatures improve efficiency by removing the need for certificate verification. Finally, it proposes a solution using identity-based ring signatures for anonymously sharing energy usage data in a smart grid.
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”IRJET Journal
This document summarizes a research paper on developing an alert system to create safe areas using blockchain technology. The system aims to provide security for both crime data and humans by encrypting crime reports on the blockchain to prevent hackers from accessing or modifying the data. It involves building a registration and login system for both new users and the crime branch. The crime branch would upload area-wise crime reports that are securely stored on the blockchain network. New users could then access reports for a given area to stay informed on local crime. The system aims to securely store data, reduce paperwork, allow data access from anywhere, lower administrative burdens, and help prevent cybercrime through blockchain data encryption and security.
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
This document reviews key-based encryption schemes for secure data sharing on cloud. It discusses how traditional encryption techniques are not suitable for large scale data sharing due to complex key management. A key-based encryption scheme is proposed that allows a data owner to generate an aggregate encryption key and submit a single aggregate trapdoor for keyword search. This reduces key management complexity and the number of trapdoors needed compared to traditional techniques. The proposed scheme uses seven polynomial algorithms for security including key generation, encryption, key extraction and trapdoor generation. It aims to provide an effective solution for secure and scalable data sharing using cloud storage.
Cloud assisted mobile-access of health data with privacy and auditabilityIGEEKS TECHNOLOGIES
The document proposes a cloud-assisted mobile health system with privacy and auditability. It introduces using a private cloud to store and process health data, with cryptographic mechanisms like searchable symmetric encryption, identity-based encryption, and attribute-based encryption to provide privacy. This includes hiding search and access patterns. The system also allows for auditing of emergency data access. The proposed architecture and modules are described, including key management, secure indexing, and role-based access control with auditing functionality.
Cloud assisted mobile-access of health data with privacy and auditabilityShakas Technologies
The document proposes a cloud-assisted mobile health system that allows patients to securely store and search health records in the cloud while preserving privacy. It discusses existing privacy issues with electronic health systems and proposes a system using private cloud services, searchable symmetric encryption, identity-based encryption and attribute-based encryption to ensure data confidentiality, anonymity, unlinkability, and auditability of data access. The system is designed to store encrypted health records on the cloud and allow authorized users like doctors to securely search and access records when needed, including in emergency situations.
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
Key frame extraction is an essential technique in the computer vision field. The extracted key frames should brief the salient events with an excellent feasibility, great efficiency, and with a high-level of robustness. Thus, it is not an easy problem to solve because it is attributed to many visual features.
This paper intends to solve this problem by investigating the relationship between these features detection and the accuracy of key frames extraction techniques using TRIZ. An improved algorithm for key frame extraction was then proposed based on an accumulative optical flow with a self-adaptive threshold (AOF_ST) as recommended in TRIZ inventive principles. Several video shots including original and forgery videos with complex conditions are used to verify the experimental results. The comparison of our results with the-state-of-the-art algorithms results showed that the proposed extraction algorithm can accurately brief the videos and generated a meaningful compact count number of key frames. On top of that, our proposed algorithm achieves 124.4 and 31.4 for best and worst case in KTH dataset extracted key frames in terms of compression rate, while the-state-of-the-art algorithms achieved 8.90 in the best case.
The adoption of cloud environment for various application uses has led to security and privacy concern of user’s data. To protect user data and privacy on such platform is an area of concern. Many cryptography strategy has been presented to provide secure sharing of resource on cloud platform. These methods tries to achieve a secure authentication strategy to realize feature such as self-blindable access tickets, group signatures, anonymous access tickets, minimal disclosure of tickets and revocation but each one varies in realization of these features. Each feature requires different cryptography mechanism for realization. Due to this it induces computation complexity which affects the deployment of these models in practical application. Most of these techniques are designed for a particular application environment and adopt public key cryptography which incurs high cost due to computation complexity. To address these issues this work present an secure and efficient privacy preserving of mining data on public cloud platform by adopting party and key based authentication strategy. The proposed SCPPDM (Secure Cloud Privacy Preserving Data Mining) is deployed on Microsoft azure cloud platform. Experiment is conducted to evaluate computation complexity. The outcome shows the proposed model achieves significant performance interm of computation overhead and cost.
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...IRJET Journal
This document summarizes a research paper that proposes a method for ensuring data integrity and privacy when data is stored on cloud computing systems. The method uses blockchain techniques and distributed verification to provide redundancy and guarantee data reliability. It allows both data owners and public verifiers to check data integrity without downloading the entire dataset. The technique utilizes homomorphic tokens and ring signatures to enable auditing while preventing privacy leaks about user identities or data contents. Prior works on remote data integrity lacked either public auditing or support for dynamic data operations, but the proposed method achieves both.
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
I want you to Read intensively papers and give me a summary for every paper and the linghth for
each paper is 2 pages or more. In the summary, you need to provide some of your own ideas.
Research Interests: Privacy-Aware Computing,Wireless and Mobile Security,Fog
Computing,Mobile Health and Safety, Cognitive Radio Networking,Algorithm Design and
Analysis.
You should select papers from the following conferences:
IEEE INFOCOM, IEEE Symposium on security and privacy, ACM CCS, USENIX Security.
Solution
PRIVACY AWARE COMPUTING
Introduction
With the increasing public concerns of security and personal data privacy worldwide, security
and privacy become an important research area. This research area is very broad and covers
many application domains.
The security and privacy aware computing research group actually focuses on
(1) privacy-preserved computing,
(2) Video surveillance, and
(3) secure biometric system.
Now let us briefly discuss the above three groups.
Privacy-preserved Computing
Concerns on the data privacy have been increasing worldwide. For example, Apple was
reportedly fined by South Korea’s telecommunications regulator for allegedly collecting and
storing private location data of iPhone users. The privacy concerns raised by both end-users and
government authorities have been hindering the deployment of many valuable IT services, such
as data mining and analysis, data outsourcing, and mobile location-aware computing.
soo, in response to the growing necessity of protecting data privacy, our research group has been
focusing on developing innovative solutions towards information services --- to support these
services while preserving users’ personal privacy.
Video Surveillance
With the growing installation of surveillance video cameras in both private and public areas, the
closed-circuit TV (CCTV) has been evolved from a single camera system to a multiple camera
system; and has recently been extended to a large-scale network of cameras.
One of the objectives of a camera network is to monitor and understand security issues in the
area under surveillance. While the camera network hardware is generally well-designed and
roundly installed, the development of intelligent video analysis software lags far behind. As
such, our group has been focusing on developing video surveillance algorithms such as face
tracking, person re-identification, human action recognition.
Our goal is to develop an intelligent video surveillance system.
Secure Biometric System
With the growing use of biometrics, there is a rising concern about the security and privacy of
the biometric data. Recent studies show that simple attacks on a biometric system, such as hill
climbing, are able to recover the raw biometric data from stolen biometric template. Moreover,
the attacker may be able to make use of the stolen face template to access the system or cross-
match across databases. Our group has been working on face template protection, multimodality
template protection, and .
Anonymous Key Based Secure File Encryption in CloudIRJET Journal
This document proposes a new system for secure file encryption and sharing in the cloud. It aims to address security issues with sharing data in social media. The key aspects of the proposed system are:
1. It creates separate databases for individual users and a local server to securely store user keys for encryption/decryption.
2. Files are encrypted using triple DES before being stored in the cloud to prevent unauthorized access.
3. A user can share files with others by providing encryption keys through the local server.
4. When a file is shared, a temporary server decrypts and re-encrypts the file with the recipient's key for added security.
The system aims to improve data security when
Similar to Increasing Security Level in Data Sharing Using Ring Signature in Cloud Environment (20)
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Manufacturing Process of molasses based distillery ppt.pptx
Increasing Security Level in Data Sharing Using Ring Signature in Cloud Environment
1. Mrs S.Arogya Swarna Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 6) February 2016, pp.01-06
www.ijera.com 1|P a g e
Increasing Security Level in Data Sharing Using Ring Signature
in Cloud Environment
Mrs S.Arogya Swarna, Ms.Shirin Ayisha Maryam.M
Assosciate Professor and HoD/PG CSE S.Veerasamy Chettiar College of Engineering Puliangudi
Assistant Professor/CSE S.Veerasamy Chettiar College of Engineering Puliangudi
Abstract
Sharing of Information in a cloud environment is inevitable in onward of cloud computing environment.
Security in accessing cloud information has to consider many issues such as authentication, cost, time in
uploading and many other criteria. Authentication of data is must for utilizing the others data and uploading our
own data has become tedious. Getting Certificate and for every access is long process and cost increases. Ring
signature gives an assurance to the user to build an unidentified and accurate information sharing system. It
allows a data individualistic to innominate authenticate his data which can be put into the cloud for storage or
analysis purpose. In Identity-Based (ID Based ) Ring Signature Members of this cluster can easily share data
avoiding the pricey certificate verification as done in the usual procedure. Forward Security re authentication
overhead is avoided in Ring Signature by using RSA Algorithm we further provide increased level of security in
reduced time, efficient and simple manner.
Keywords: Authentication, data sharing, cloud computing, Increased Security.
I. INTRODUCTION
In cloud computing, there are a number of
security issues/concerns associated with cloud
computing but these issues fall into two broad
categories: security issues faced by cloud providers
and security issues faced by their The responsibility
goes both ways, however: the provider must ensure
that their infrastructure is secure and that their
clients’ data and applications are protected while the
user must take measures to fortify their application
and use strong passwords and authentication
measures.
The popularity and widespread use of “CLOUD"
has brought great convenience for data sharing and
collection. Not only can individuals acquire useful
data more easily, sharing data with others can provide
a number of benefits to our society as well As a
representative example, consumers in Smart Grid
can obtain their energy usage data in a fine-grained
manner and are encouraged to share their personal
energy usage data with others, e.g., by uploading the
data to a third party platform such as Microsoft
Hohm . From the collected data a statistical report is
created, and one can compare their energy
consumption with others (e.g., from the same block).
This ability to access, analyze, and respond to much
more precise and detailed data from all levels of the
electric grid is critical to efficient energy usage. Due
to its openness, data sharing is always deployed in a
hostile environment and vulnerable to a number of
security threats. Taking energy usage data sharing of
security threats. Sharing in Smart Grid as an
example, there are several security goals a practical
system must meet, including:
Reliability of data:
The situation of Smart Grid, the statistic energy
usage data being misleading if it is forged by
adversaries. While this issues alone can be solved
using well established cryptographic tools, one may
encounter additional difficulties when other issues
are taken into account, such as anonymity and ability.
Unsingularity:
Energy usage data contains large data of
consumers, from which summary the number of
persons in the home, variety of electric utilities used
in a specific time period It is critical to protect the
anonymity of consumers applications, and any
failures to do so may lead to the reluctance from the
consumers to share data with others.
Effectiveness:
The many users in a information sharing System
could be large and a practical system must reduce.
The computation and communication cost as much as
possible. Otherwise it would lead to a waste of
energy, which contradicts the goal of Smart Grid. To
investigating fundamental security tools for realizing
the three properties we described. Note that there are
other security issues in a information sharing system
which are equally important, such as availability and
access control.
RESEARCH ARTICLE OPEN ACCESS
2. Mrs S.Arogya Swarna Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 6) February 2016, pp.01-06
www.ijera.com 2|P a g e
Ring Signature
In cryptography, a ring signature is a type of
digital signature that can be performed by any
member of a group of users that each have keys.
Therefore, a message signed with a ring signature is
endorsed by someone in a particular group of people.
One of the security properties of a ring signature is
that it should be computationally infeasible to
determine which of the group members' keys was
used to produce the signature. Ring signatures are
similar to group signatures but differ in two key
ways: first, there is no way to revoke the anonymity
of an individual signature, and second, any group of
users can be used as a group without additional setup.
Ring signatures were invented by Ron Rivest, Adi
Shamir, and Yael Tauman, and introduced at
ASIACRYPT in The name "ring signature" comes
from the ring-like structure of the signature
algorithm.
Fig: 1 System Architecture
1.1 Identity-based Ring Signature
Three issues remind us cryptographic Primitive
“identity-based ring signature”, an efficient solution
on applications requiring data authenticity and
anonymity.
1.1.1ID-basedCryptosystem
Identity-based (ID-based) cryptosystem,
introduced by Shamir, eliminated the need for
verifying the validity of public key certificates, the
management of which is both time and cost
consuming. In an ID-based cryptosystem, the public
key of each user is easily computable from a string
corresponding to this user’s publicly known
identity(e.g., an email address, a residential address,
etc.). A private key generator(PKG) then computes
private keys from its master secret for users This
property avoids the need of certificates (which are
Necessary in traditional public-key infrastructure)
Associates an implicit public key to each user with
in the system. In order to verify an ID-based
signature, different from the traditional public key
based signature, one does not need to verify the
certificate first .The elimination of the certificate
validation makes the Whole verification process more
efficient ,which will lead To a significant save in
communication and computation When a large
number of users are involved Ring signature is a
group-oriented signature with privacy protection on
signature producer. A user can sign anonymously on
behalf of a group on his own choice, while group
members can be totally unaware of being conscripted
in the group. Any verifier can be convinced that a
message has been signed by one of the members in
this group (also called the Rings), but the actual
identity of the signer is hidden. Ring signatures could
be used for whistle blowing, anonymous membership
authentication for ad hoc groups and many other
applications which do not want complicated group
formation stage but require signer anonymity. There
have been many different schemes proposed.
1.1.2An Affirmative Benefits in Big Data
Due to its natural framework, ring signature in
ID-based Setting has a significant advantage over its
counterpart in traditional public key setting,
especially in the big data Analytic environment.
Suppose there are 10000 users in the ring, the verifier
of a traditional public key based Ring signature must
first validate 10000 certificates of the Corresponding
users, after which one can carry out the actual
verification on The message and signature pair. In
Contrast ,to verify an ID-based ring signature, only
the Identities of ring users, together with the pair of
message And signature are needed. As one can see,
the elimination of certificate validation, which is a
costly process, saves A great amount of time and
computation. This saving will be more critical if a
higher level of anonymity is needed by increasing the
number of users in the ring. thus, as depicted , ID-
RING
MEMBERS
LOGIN
USER
DATA
ADMIN
KEY
GENERATIO
N
ENCRYPTIO
N
TRANSFER
RECEIVED
ON
SOURCE
NODE SHARIN
G
RECEIVED
ON
DESTINATI
ON NODE
CLOUD
LOGIN
UPLOAD
DATA
DATA
BASE
3. Mrs S.Arogya Swarna Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 6) February 2016, pp.01-06
www.ijera.com 3|P a g e
based ring signature is more preferable in the setting
with a large number of Users such as energy data
sharing in smart grid:
Step 1: The energy data owner (say, Bob) first setups
a ring by choosing a group of users. This phase Only
needs the public identity information of ring
members, such as residential addresses, and Bob does
not need the collaboration from any ring members.
Step 2: Bob uploads his personal data of electronic
Usage, together with a ring signature and the identity
information of all ring members.
Step 3: By verifying the ring signature, one can be
Ring signature is a group oriented signature with
assured that the data is indeed given out by a valid
resident (from the ring members) while cannot figure
out who the Resident is. Hence the anonymity of the
data provider is ensured together with data
authenticity Mean while, the verification is efficient
which does not involve any certificate verification.
The ID-based ring signature scheme was proposed in
2002. This can be proven secure in the random oracle
model. Two constructions in the standard model were
proposed in. Their first construction however was
discovered to be flaw while the second construction
is only proven secure in a weaker model, namely,
selective-ID model. The first ID-based Ring signature
scheme claimed to be secure in the standard model is
due to Hanetal. Under the trusted set up assumption.
1.2TheMotivation
1.2.1Key Exposure
ID-based ring signature seems to be an optimal
trade-off among efficiency, data authenticity and
anonymity, And provides a sound solution on data
sharing with a Large number of participants. To
obtain a higher level protection, one can add more
users in the ring. But doing this increases the chance
of key exposure as well. Key exposure is the
fundamental limitation of ordinary digital signatures.
If the private key of a signer is compromised, all
signatures of that signer become worthless: future
signatures are invalidated and no previously issued
signatures can be trusted. Once a key leakage is
identified, key revocation mechanisms must be
invoked immediately in order to prevent the
generation of any signature using the compromised
secret key. However, this does not solve the problem
of forgetability for past signatures. The notion of
forward secure signature was proposed to preserve
the validity of past signatures even if the current
secret key is compromised. The concept was first
suggested by Anderson. And the solutions were
designed by Bellare and Miner. The idea is dividing
the total time of the validity of a public key into T
time periods, and a key compromise of the current
timeslot does not enable an adversary to produce
valid signatures pertaining to past time slots
1.2.2 Key Exposure in Big Data Sharing System
The issue of key exposure is more severe in a
ring Signature scheme: if a ring member’s secret key
is exposed, the adversary can produce valid ring
signatures of any documents on behalf of that group.
Even worse, the “group" can be defined by the
adversary at will due to the spontaneity property of
ring signature: The adversary only needs to include
the compromised user in the “group" of his choice.
As a result, the exposure of one user’s secret key
renders all previously obtained ring signatures invalid
(if that user is one of the ring members), since one
cannot distinguish whether a ring signature is
generated prior to the key exposure or by which user.
Therefore, forward security is a necessary
requirement that a big data sharing system must meet.
Otherwise, it will lead to a huge waste of time and
resource.
While there are various designs of forward-
secure digital signatures adding forward security on
ring signatures turns out to be difficult. As far as the
authors know, there is only two forward secure ring
signature schemes .However, they are both in the
traditional public key setting where signature
verification involves expensive certificate check for
every ring member. This is far below satisfactory if
the size of the ring is huge, such as the users of a
Smart Grid. To summarize, the design of ID-based
ring signature with forward security, which is the
fundamental tool for realizing cost-effective authentic
and anonymous data sharing, is still an open problem.
1.3 Contribution
In this paper, we propose increased security in
ID-based Ring Signature, which is an essential tool
for building time reducing cost-effective authentic
and anonymous data sharing system:
Provided formal definitions on forward secure
ID-based ring signatures; In a present concrete
design of forward secure ID based ring signature. In
the literature have the property of forward security,
and prove the security of the proposed scheme in the
random oracle model, under the standard RSA
assumption; and implementation, in the following
ways:
In ID-based setting. The elimination of the costly
certificate verification process makes it scalable
and especially suitable for big data analytic
environment.
The size of a secret key is just one integer.
Key update process only requires an
exponentiation. do not require any pairing in any
stage.
Improved security in uploading in reduced time.
4. Mrs S.Arogya Swarna Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 6) February 2016, pp.01-06
www.ijera.com 4|P a g e
II. DEFINITION
2.1 Mathematical Assumption
Definition 1 (RSA Problem): Let N = pq, where
p and q are two k-bit prime numbers such that p = 2p
+ 1 and q = 2q + 1 for some primes p, q. Let e be a
prime greater than 2 for some fixed parameter, such
that
gcd(e; ɸ(N)) = 1. Let y be a random element in Z*N
We say that an algorithm S solves the RSA problem
if it receives an input the tuple (N; e; y) and outputs
an element z such that z = y mod N.
3 Ring Signature Scheme with Increased Security
and reduced Time
The description and analysis of our proposed
Increased forward secure ring signature scheme as
follows
3.1 The Design
The identities and user secret keys are valid into
T periods and make the time intervals public. also set
the message space M= {0 ,1}*.
Setup. The PKG generates two random k-bit prime
numbers p and q such that p = 2p +1 and q = 2q +1
where p; q are some primes. It computes N = pq.
Extract. For user i, where i Є Z, with identity IDi Є
{0; 1}* requests for a secret key at time period t
(denoted by an integer), where 0 < t < T, the PKG
computes the user secret key
ski;t = [H1(IDi)] e(T+1�t) mod N
Update. On input a secret key ski;t for a time period t,
if t < T the user updates the secret key.
Sign. To sign a message m Є {0; 1}* in time period
t, where 0 < t < T, on a ring of identities L =
{ID1,…., IDn}, a user with identity IDπ Є L and
secret key skπ,t:
Verify. To verify a signature for a message m, a list
of identities L and the time period t.
Implementation and Experimental Results
The performance of this scheme with respect to
three entities: the private key generator (PKG) for
increased security, the data sharer (user), and the
service provider (data center). In the experiments, the
programs for three entities are implemented using the
public cryptographic library MIRACL programmed
in C++. All experiments were repeated 100 times to
obtain average results shown in this paper, and all
experiments were conducted for the cases of |N| =
1024 bits and |N| =2048 bits respectively.
The average time for the PKG to setup the system ,
where the test bed for the PKG is a DELL T5500
workstation equipped with 2.13 GHz Intel Xeon
Dual-core dual-processor with 12GB RAM and
running Windows 7 Professional 64-bit operating
system. It took 151 ms and 2198 ms for the PKG to
setup the whole system for |N| = 1024 bits and |N| =
2048 bits respectively.
(Unit: ms)
Parameters: |N|=1024,|K|=512 (a)
The number of users in the ring
(b)
Fig: The average time for the data owner to sign
Energy usage data, |N|=1024
E-CONTRACT SIGNING: A 1-out-of-2 ring
signature (containing two users in the ring) can be
used to construct concurrent signature. A concurrent
signature allows two entities to produce two
signatures in such a way that, from the point of view
of any third party, both signatures are ambiguous
with respect to the identity of the signing party until
an extra piece of information (the keystone) is
released by one of the parties. Upon release of the
keystone, both signatures become binding to their
true signers concurrently
0
1
2
3
4
5
6
10 20 30 200
Series4
Series5
Series6
Series7
Series8
No of
Users in
Ring
Reduced Timing When Security is
Incresed
T=100 T=200 T=300
N=10 500 600 700
N=20 650 700 500
N=30 700 600 650
N=40 800 600 850
5. Mrs S.Arogya Swarna Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 6) February 2016, pp.01-06
www.ijera.com 5|P a g e
E-AUCTION: Similar to e-contract signing, ring
signature schemes can be used to construct e-auction
protocols by using ring signature, a winner-
identifiable anonymous auction protocol can be build
efficiently. That is to say, the auctioneer can
authenticate the real identity of the winner at the end
of the protocol without additional interactions with
the winning bidder even though all the bidders bid
anonymously
III. CONCLUSION AND FUTURE
ENHANCEMENT
Forward Secure ID-Based Ring Signature. It
allows an ID-based ring signature scheme to have
forward security. It is the first in the literature to have
this feature for ring signature in ID-based setting. Our
scheme provides unconditional anonymity and can be
proven forward-secure unforgeable in the random
oracle model, assuming RSA problem is hard. Our
scheme is very efficient and does not require any
pairing operations. The size of user secret key is just
one integer, while the key update process only
requires an exponentiation. We believe our scheme
will be very useful in many other practical
applications, especially to those require user privacy
and authentication, such as ad-hoc network, e-
commerce activities and smart grid. Our current
scheme relies on the random oracle assumption to
prove its security. To improve security for
authentication on ring members using MAC
algorithm. SHA-1 and MD5 algorithm is used for
data encryption. In this algorithm is used for large
size of data should be encrypted. sharing data on one
ring members to another ring members. Then
enhance security on data sharing and upload the
data on cloud. We consider a provably secure
scheme with the same features in the standard model
as an open problem and our future research work.
REFERENCES
[1.] Xinyi Huang, Joseph K. Liu+ Cost-Effective
Authentic and Anonymous Data Sharing
with Forward Security,2014.
[2.] M. H. Au, J. K. Liu, T. H. Yuen, and D. S.
Wong. Id-based ring signature scheme
secure in the standard model. In IWSEC,
volume 4266 of Lecture Notes in Computer
Science, pages 1–16. Springer, 2006.
[3.] J.-M. Bohli, N. Gruschka, M. Jensen, L. L.
Iacono, and N. Marnau. Security and
privacy-enhancing multicloud architectures.
IEEE Trans. Dependable Sec. Comput.,
10(4):212–224, 2013.
[4.] K. Chard, K. Bubendorfer, S. Caton, and O.
F. Rana. Social cloud computing: A vision
for socially motivated resource sharing.
IEEE T. Services Computing, 5(4):551–563,
2012.
[5.] J. Han, Q. Xu, and G. Chen. Efficient id-
based threshold ring signature scheme. In
EUC (2), pages 437–442. IEEE Computer
Society, 2008.
[6.] M. Li, S. Yu, Y. Zheng, K. Ren, and W.
Lou. Scalable and secure sharing of personal
health records in cloud computing using
attribute-based encryption. IEEE Trans.
Parallel Distrib. Syst., 24(1):131–143, 2013.
[7.] J. K. Liu, T. H. Yuen, and J. Zhou. Forward
secure ring signature without random
oracles. In ICICS, volume 7043 of Lecture
Notes in Computer Science, pages1- 14.
Springer, 2011.
[8.] X. Liu, Y. Zhang, B. Wang, and J. Yan.
Mona: Secure multi-owner data sharing for
dynamic groups in the cloud. IEEE Trans.
Parallel Distrib. Syst., 24(6):1182–1191,
2013
[9.] C. A. Melchor, P.-L. Cayrel, P. Gaborit, and
F. Laguillaumie. A new efficient threshold
ring signature scheme based on coding
theory. IEEE Transactions on Information
Theory, 57(7):4833–4842, 2011
[10.] H. Shacham and B. Waters. Efficient ring
signatures without random oracles. In Public
Key Cryptography, volume 4450 of Lecture
Notes in Computer Science, pages 166–180.
Springer, 2007.
[11.] S. Sundareswaran, A. C. Squicciarini, and
D. Lin. Ensuring distributed accountability
for data sharing in the cloud. IEEE Trans.
Dependable Sec. Comput., 9(4):556–568,
2012.
[12.] P. P. Tsang, M. H. Au, J. K. Liu, W. Susilo,
and D. S. Wong. A suite of non-pairing id-
based threshold ring signature schemes with
different levels of anonymity (extended
abstract). In ProvSec, volume 6402 of
Lecture Notes in Computer Science, pages
166–183. Springer, 2010.
[13.] Y. Wu, Z. Wei, and R. H. Deng. Attribute-
based access to scalable media in cloud-
assisted content sharing networks. IEEE
Transactions on Multimedia, 15(4):778–788,
2013.
[14.] G. Yan, D. Wen, S. Olariu, and M. Weigle.
Security challenges in vehicular cloud
computing. IEEE Trans. Intelligent
Transportation Systems, 14(1):284–294,
2013.
[15.] J. Yu, R. Hao, F. Kong, X. Cheng, J. Fan,
and Y. Chen. Forwardsecure identity-based
signature: Security notions and construction.
Inf. Sci., 181(3):648–660, 2011.
[16.] J. Yu, F. Kong, H. Zhao, X. Cheng, R. Hao,
and X.-F. Guo. Noninteractive forward-
secure threshold signature without random
6. Mrs S.Arogya Swarna Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 6) February 2016, pp.01-06
www.ijera.com 6|P a g e
oracles. J. Inf. Sci. Eng., 28(3):571–586,
2012.
[17.] Amit K Awasthi and Sunder Lal. ID-based
Ring Signature and Proxy Ring Signature
Schemes from Bilinear Pairings.
eprint.iacr.org/2004/184.pdf
[18.] C. Wang, S. S. M. Chow, Q. Wang, K. Ren,
and W. Lou. Privacy preserving public
auditing for secure cloud storage. IEEE
Trans. Computers, 62(2):362–375, 2013