Improved Identity Based Digital Signature Authentication Using Feistel Algorithm in Cloud Computing

  • Juluru ArunaEmail author
  • D. Ashwani
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 5)


Though the widespread popularity of public clouds brought great channel of communication for sharing and retrieving data. The data is vulnerable to security threats as it is fully to the service provider side. So there must be lot many security checkpoints, a real world system should meet. So we are proposing an efficient method of authenticating the data by generating a group key through ID based digital signature approach where a group key is broadcasted to all the users in the group. After the authentication process the data members decrypt the data from the cloud and get their plain format back using Feistel algorithm.


Feistel algorithm Identity based digital signature schema Cloud secret points Cloud computing 


  1. 1.
    Jianying Zhou, Shaohua Tang, Li Xu, Yang Xiang, Xinyi Huang, Joseph K. Liu, Kaitai Liang, “Cost-Effective Authentic and Anonymous data sharing with forward security”, IEEE Transactions on computers, volume 64, 2015.Google Scholar
  2. 2.
    Anna C. Squicciarini, Dan Lin, and Smitha Sundareswaran, “Ensuring Distributed Accountability for Data Sharing in the Cloud,” IEEE Transaction on a secure computing, volume 9, 2012.Google Scholar
  3. 3.
    S. Huang, A. Squicciarini, D. Lin, and S. Sundareswaran, “Promoting Distributed Accountability in the Cloud,” IEEE Transaction on Cloud Computing, 2011.Google Scholar
  4. 4.
    Jun’e Liu, Robert H. Deng and ZhiguoWan, “HASBE: A Hierarchical Attribute-Based Solution for flexible and Scalable Access Control in Cloud Computing.Google Scholar
  5. 5.
    P.-L. Cayrel, P. Gaborit, C. A. Melchor, and F. Laguillaumie. A new efficient threshold ring signature scheme based on coding theory. IEEE Transactions on Information Theory, 57(7):4833–4842, 2011.Google Scholar
  6. 6.
    M. Mowbray, S. Pearson, and Y. Shen, “A privacy Manager for Cloud Computing”, IEEE transaction on Cloud Computing, pp. 90–106, 2009.Google Scholar
  7. 7.
    A. Charlesworth, and S. Pearson, “Accountability as a Way Forward for Privacy Protection in the Cloud,” conf. Cloud Computing, 2009.Google Scholar
  8. 8.
    J.I. den Hartog, I. Staicu, G. Lenzini, S. Etalle, and R. Corin, “A Logic for Auditing Accountability in Decentralized Systems,” IFIP TC1 WG1.7 Workshop Formal Aspects in Security and Trust, pp. 187–201, 2005.Google Scholar
  9. 9.
    A. Squicciarini, S. Sundareswaran and D. Lin, “Preventing Information Leakage from Indexing in the Cloud,” Proc. IEEE Int’l Conf. Cloud Computing, 2010.Google Scholar
  10. 10.
    B. Chun and A. C. Bavier, “Decentralized Trust Management and Accountability in Federated System,” Proc. Ann. Hawaii Int’l Conf. System Science (HICSS), 2004.Google Scholar
  11. 11.
    A. K. Awasthi and S. Lal. Id-based ring signature and proxy ring signature schemes from bilinear pairings. CoRR, abs/cs/0504097, 2005.Google Scholar
  12. 12.
    W. Lim and K. Paterson, “Multi-Key Hierarchical Identity-Based Signatures,” Proc. 11th IMA Int’l Conf. Cryptography and Coding (IMA ‟07), S. Galbraith, ed., pp. 384–402, Dec. 2007.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Computer Science and Technology, Department of CSEANIL Neerukonda Institute of Technology and Sciences (ANITS)VisakhapatnamIndia

Personalised recommendations